markkcc / crxaminerLinks
Examine Chrome extensions for security issues
☆85Updated last month
Alternatives and similar repositories for crxaminer
Users that are interested in crxaminer are comparing it to the libraries listed below
Sorting:
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A home for detection content developed by the delivr.to team☆70Updated last month
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 6 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆86Updated last week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆43Updated 2 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆98Updated 7 months ago
- Baseline a Windows System against LOLBAS☆29Updated last year
- A list of RMMs designed to be used in automation to build alerts☆112Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- ☆33Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆63Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆26Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- DEFCON 31 slide deck and video link☆65Updated 3 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 2 months ago
- ☆74Updated last week
- Canary Detection☆187Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- ☆47Updated 5 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- Slides of my public talks☆56Updated last year
- ☆104Updated 2 months ago