Collect chrome extensions from various devices and find out if they are malicious
☆25Mar 1, 2026Updated last month
Alternatives and similar repositories for malicious-chrome-extension-scanner
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- ☆22Mar 4, 2025Updated last year
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 7 years ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆12Jun 19, 2025Updated 10 months ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆38Aug 23, 2022Updated 3 years ago
- ☆28Sep 15, 2016Updated 9 years ago
- Assorted Python☆15Sep 6, 2024Updated last year
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Feb 9, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A step towards automating the creation of Ghidra processor modules☆41Apr 13, 2025Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- SAML Shield is an open-source Node.js library that proactively validates and rejects malicious SAML assertions at the protocol level, pro…☆53Apr 7, 2026Updated last week
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- yara detection rules for hunting with the threathunting-keywords project☆159May 11, 2025Updated 11 months ago
- A proof-of-concept malicious Chrome extension☆93Jul 19, 2022Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- Sysmon Config Pusher - Modernized☆38Jan 7, 2026Updated 3 months ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- ❄️ generate a static website from a dynamic one☆12Aug 22, 2018Updated 7 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago