markkcc / crxaminer
Examine Chrome extensions for security issues
☆81Updated last month
Alternatives and similar repositories for crxaminer:
Users that are interested in crxaminer are comparing it to the libraries listed below
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated last week
- ☆93Updated 3 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 2 weeks ago
- Living Off Security Tools☆45Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 2 weeks ago
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- NOVA: The Prompt Pattern Matching☆57Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- Slides of my public talks☆55Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- A preconfigured Velociraptor triage collector☆51Updated last week
- ☆33Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆13Updated last week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 4 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆44Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆43Updated this week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 6 months ago
- A list of RMMs designed to be used in automation to build alerts☆110Updated last week
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- C2 Active Scanner☆55Updated 10 months ago
- ☆74Updated 3 weeks ago
- Living off the False Positive!☆35Updated 2 months ago