wayfair-incubator / malicious-chrome-extension-scannerLinks
Collect chrome extensions from various devices and find out if they are malicious
☆24Updated last month
Alternatives and similar repositories for malicious-chrome-extension-scanner
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below
Sorting:
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- ☆18Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 4 months ago
- Public release of Whalehoney Honeypot☆29Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆25Updated 6 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Updated 2 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- My Jupyter Notebooks☆36Updated 6 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- CSIRT Jump Bag☆26Updated last year
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 6 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 5 months ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- Windows event log anomaly detection powered by ATPA technologies☆26Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- ☆44Updated 2 months ago
- ☆30Updated 6 years ago