Total Threats
-
Sources
-
Latest
-
Show rows
Loading...
Fetching threat database...
Pulling latest intelligence from GitHub
Threat Intelligence Feeds
Machine-readable exports updated with every database commit. Pick a format and ingest.
6
Formats
Live
Updates
Format Name Description
MISP Event JSON Full event with extension attributes for MISP import.
MISP Warning List Flag Extension IDs in MISP events automatically.
STIX 2.1 STIX Bundle Complete SDO bundle for TAXII / OpenCTI.
CSV OpenCTI Indicators Flat indicator list with confidence scores for OpenCTI.
Splunk Lookup Table CSV lookup for SPL queries and registry monitoring.
JSON Generic Feed Raw JSON array for custom scripts and integrations.
Report Library
Loading…
Select a report
← Choose a report from the list
Drop a .crx or .zip file here
Click to browse · manifest.json also accepted
OR
Fetch by Extension ID or Store URL
Name -
Version -
Manifest -
Description -
Files
Viewing: -
Select a file to view its contents
Risk Analysis

MalExt Sentry

Real-time tracking of malicious browser extensions from multiple threat intelligence sources.

What it does

MalExt Sentry aggregates malicious and policy-violating browser extensions from security researchers, SOC teams, and community reports. Each extension is tracked with its detection reason, source, and blocklist status to help analysts identify threats across users and organizations.

Data sources

The database pulls from:

  • Chrome Web Store policy violation reports
  • Security researcher submissions
  • Threat intelligence feeds
  • Community-contributed detections
  • Google Chrome's built-in blocklist

Updates occur continuously as new threats are identified and verified. Each entry includes the extension ID, threat category (malware, bundling, scareware, etc.), source origin, and reporting date.

Threat intelligence feeds

Machine-readable exports are available in 6 formats for integration with security tools:

  • MISP event JSON and warning lists
  • STIX 2.1 bundles for TAXII / OpenCTI
  • CSV for OpenCTI and Splunk
  • Generic JSON for custom workflows

All feeds update automatically with each database commit.

Extension parser

Analyze .crx, .zip, and manifest.json files directly. Extract extension metadata (name, version, manifest version), identify embedded scripts, and highlight potential risk indicators. Download all extracted files as a ZIP archive for further inspection.

Methodology

Entries are not automatically generated. Each threat is sourced from verified security researchers or official policy violation reports. The database prioritizes accuracy over speed - false positives harm analyst credibility. All entries include context: why the extension was flagged, by whom, and when.

Project

Maintained as open source on GitHub. The database, feeds, and extension parser are community-driven security tools for analysts, researchers, and detection engineers.

View on GitHub

IOCs
ALL SOURCES