wayfair-incubator / malicious-chrome-extension-scannerView external linksLinks
Collect chrome extensions from various devices and find out if they are malicious
☆24Jan 17, 2026Updated last month
Alternatives and similar repositories for malicious-chrome-extension-scanner
Users that are interested in malicious-chrome-extension-scanner are comparing it to the libraries listed below
Sorting:
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Assorted Python☆15Sep 6, 2024Updated last year
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- ☆22Mar 4, 2025Updated 11 months ago
- Examine Chrome extensions for security issues☆94Nov 16, 2025Updated 3 months ago
- SAML Shield is an open-source Node.js library that proactively validates and rejects malicious SAML assertions at the protocol level, pro…☆54Feb 6, 2026Updated last week
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- ☆34Aug 23, 2022Updated 3 years ago
- Historical Tracking of MAC Address Assignments☆40Updated this week
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 4 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated last year
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆93Mar 22, 2025Updated 10 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Feb 9, 2018Updated 8 years ago
- Cyber-Zero: Training Cybersecurity Agents Without Runtime☆70Feb 11, 2026Updated last week
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Oct 22, 2020Updated 5 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Jul 21, 2021Updated 4 years ago
- ☆105Jul 5, 2025Updated 7 months ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- 🧩 Downloads crx files of Chrome extensions☆10Apr 7, 2018Updated 7 years ago