Chrome Extensions for Security Researcher

The importance of browser is not a hidden truth in the process of penetration testing or ethical hacking, security researcher probably prefer Firefox as browser because it has a wide range of add ons that will help to make the test easier, however we have seen the rapid increase in the usage of google chrome, you can count chrome among the best browsers. 

On previous article we have discussed about the security extension that are available on Firefox.On this article I will discuss the best extensions (add ons) that are available for chrome browser and plays an important role for security researcher, web developers and ethical hacker.

One of the best chrome extension that can See the geolocation, DNS, whois, routing, search results, hosting, domain neighbors, DNSBL, BGP and ASN information of every IP address (IPv4 and IPv6). Including shortcut to Your public IP Address. It can use for whois, network lookup, spam database lookup and more.

It is a extension that will help in the process of penetration testing, you can easily log, edit and send HTTP request. Request Maker only captures requests sent via HTML forms and XMLHttpRequests; it doesn’t fill the log with useless information about images and style sheets.
If you dont want to share your information on the Internet than not sharing my info is a best extension for you, use this extension to substitute it with an anonymous alias. It can replace your real email address with fake email address and so on.

Simply the best, after information gathering scanning and enumeration is the second phase of ethical hacking process, so this extension will really help you to scan open ports just like nmap.
I think there is no need to discuss the importance of proxy and anonymity in the field of hacking. Hide My Ass! operates the most popular browser based web proxy online, this is our official extension that enables you to easily redirect your web traffic through our anonymous proxy network.
There are different coolies editor available on firefox, just like firefox we have Edit this cookie on chrome that can help you to edit any cookie, add any cookie, block cookies, delete all the cookies and many more.

XSS is a bug on a web application that allows an attacker to inject their code, if you are doing a penetration testing on a web application than XSS rays will help you to perform the test effective and efficient. It’s core features include a XSS scanner, XSS Reverser and object inspection.

If you want to keep update your self with the latest exploits, shell code and white papers than this exploit DB extension will help you.

Right-click on any link and scan the target with VirusTotal, free and easy. It gives a feature of online virus scanner amazing extension. 

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...