Collect chrome extensions from various devices and find out if they are malicious
☆24Mar 1, 2026Updated last week
Alternatives and similar repositories for malicious-chrome-extension-scanner
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below
Sorting:
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Assorted Python☆15Sep 6, 2024Updated last year
- ☆22Mar 4, 2025Updated last year
- SCAM - Security Comprehension Awareness Measure | Open-source benchmark that tests AI agents' security awareness during realistic, multi-…☆93Feb 12, 2026Updated 3 weeks ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- SAML Shield is an open-source Node.js library that proactively validates and rejects malicious SAML assertions at the protocol level, pro…☆54Feb 6, 2026Updated last month
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- ☆36Aug 23, 2022Updated 3 years ago
- Historical Tracking of MAC Address Assignments☆41Updated this week
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated 2 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ☆28Sep 15, 2016Updated 9 years ago
- Static code analysis of refpolicy style SELinux policy☆49Mar 20, 2025Updated 11 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Feb 9, 2018Updated 8 years ago
- Python Exploitation Framework☆30Updated this week
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Oct 22, 2020Updated 5 years ago
- Add a layer of active defense to your cloud applications.☆104Updated this week
- Cyber-Zero: Training Cybersecurity Agents Without Runtime☆72Feb 13, 2026Updated 3 weeks ago