Examine Chrome extensions for security issues
☆96Nov 16, 2025Updated 3 months ago
Alternatives and similar repositories for crxaminer
Users that are interested in crxaminer are comparing it to the libraries listed below
Sorting:
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 7 months ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 10 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collect chrome extensions from various devices and find out if they are malicious☆24Jan 17, 2026Updated last month
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- IP address filter by City☆12Jan 17, 2025Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆323Oct 12, 2025Updated 4 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- JavaScript for Automation (JXA) macOS agent☆92Feb 19, 2026Updated 2 weeks ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- ☆94Dec 25, 2025Updated 2 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- ☆23Mar 4, 2025Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- VirtualGHOST Detection Tool☆110Dec 3, 2025Updated 3 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆302Feb 27, 2026Updated last week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆144Feb 2, 2026Updated last month
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last week
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- MLOps Attack Toolkit☆30Aug 25, 2025Updated 6 months ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆261Sep 23, 2025Updated 5 months ago