wayfair-incubator / malicious-chrome-extension-scanner
Collect chrome extensions from various devices and find out if they are malicious
☆22Updated 2 months ago
Alternatives and similar repositories for malicious-chrome-extension-scanner:
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- ☆41Updated 9 months ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Public release of Whalehoney Honeypot☆29Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 3 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated last month
- Examine Chrome extensions for security issues☆71Updated this week
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- ☆15Updated 4 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Can you pay the ransom in your country?☆13Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆21Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago