Tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular grunt work and helps you quickly identify potential security vulnerabilities.
This tool accompanies the research blog post which can be found here. If you don’t want to go through the trouble of setting this up you can just use the tool by clicking here.
Unpolished Notice & Notes
It should be noted that this is an un-polished release. This is the same source as the deployment located at https://thehackerblog.com/tarnish/
. In the future I may clean this up and make it much easier to run but I don’t have time right now.
To set this up you’ll need to understand how to:
docker-compose
The set up is a little complex due to a few design goals:
Some quick notes to help someone attempting to set this up:
tarnish
makes use of Python Celery for analysis of extensions.t2.medium
instance to operate.tarnish
frontend is just a set of static files which is upload to a static web host configured S3 bucket.See the docker-compose.yaml.example
for the environment variable configs. Ideally you’d run ./start.sh
and navigate to the static frontend to get things running. You can use S3 for the static site or just a simple static webserver like python -m SimpleHTTPServer
(you’ll have to modify the JavaScript files to ensure origin matches, etc.
Also Read – SQLMap : Automatic SQL Injection & Database Takeover Tool
Pulls any Chrome extension from a provided Chrome webstore link.
manifest.json
viewer: simply displays a JSON-prettified version of the extension’s manifest.web_accessible_resources
and automatic generation of Chrome extension fingerprinting JavaScript.web_accessible_resources
directive set. These are potentially vulnerable to clickjacking depending on the purpose of the pages.web_accessible_resource
status.shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…