Collect chrome extensions from various devices and find out if they are malicious
☆25Mar 1, 2026Updated 3 weeks ago
Alternatives and similar repositories for malicious-chrome-extension-scanner
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆80Nov 23, 2021Updated 4 years ago
- ☆22Mar 4, 2025Updated last year
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 9 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- ☆10Sep 25, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated 2 years ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- ☆37Aug 23, 2022Updated 3 years ago
- ☆28Sep 15, 2016Updated 9 years ago
- Assorted Python☆15Sep 6, 2024Updated last year
- 🧩 Downloads crx files of Chrome extensions☆10Apr 7, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CPS Style for JavaScript, JS->CFG->JS Transpiler☆37Feb 12, 2013Updated 13 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- 这是一份简明的油猴脚本API中文参考☆14Dec 8, 2024Updated last year
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- SCAM - Security Comprehension Awareness Measure | Open-source benchmark that tests AI agents' security awareness during realistic, multi-…☆97Feb 12, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- A step towards automating the creation of Ghidra processor modules☆41Apr 13, 2025Updated 11 months ago
- ☆39Jul 29, 2021Updated 4 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago