As a security investigator, you've encountered a common frustration: Chrome extensions making suspicious DNS requests, but they're nearly impossible to trace back to their source. Why? Because all DNS requests appear to come from the chrome process, making it extremely difficult to determine which extension is responsible for what network activity.
Traditional network monitoring tools show:
Process: chrome.exe
DNS Query: suspicious-domain.com
But which extension made that request? The trail goes cold... until now.
ExtensionHound is purpose-built to solve this forensic challenge by:
- Analyzing Chrome's internal network state
- Correlating DNS requests with specific extensions
- Revealing the hidden connections between extensions and their network activities
ExtensionHound is a powerful forensic tool that breaks through the chrome process attribution barrier, allowing you to:
- 🔍 Scans Chrome profiles for extension DNS request history
- 📊 Provides detailed analysis of network connections
- 🌐 Optional VirusTotal integration for domain reputation checking
- 📁 Multiple output formats (Console, CSV, JSON)
- 🖥️ Cross-platform support (Windows, macOS, Linux)
- Clone the repository:
git clone https://github.com/arsolutioner/ExtentionHound.git
cd ExtentionHound
- Create and activate a virtual environment (recommended):
python -m venv venv
source venv/bin/activate # On Windows, use: venv\Scripts\activate
- Install required packages:
pip install -r requirements.txt
- (Optional) Set up VirusTotal integration:
- Create a
.env
file in the project root - Add your VirusTotal API key:
VT_API_KEY=your_api_key_here RATE_LIMIT_PER_MINUTE=4
- Create a
Common flags:
--chrome-dir PATH
: Specify custom Chrome directory--virustotal
: Enable VirusTotal domain checking--output FORMAT
: Choose output format (csv/json)--output-file PATH
: Specify output file path
Here are some practical examples of how to use ExtensionHound:
python ExtensionHound.py --output csv --output-file audit_results.csv
python ExtensionHound.py --vt --output json --output-file "audits/$(date +%Y-%m-%d)_security_report.json"
# Analyze a specific Chrome profile
python ExtensionHound.py --chrome-dir "/path/to/Chrome User Data/Profile 1"
# Deep dive into the Default profile with reputation checks
python ExtensionHound.py --chrome-dir "/path/to/Chrome User Data/Default" --vt
- 💼 LinkedIn: Amram Englander
- 📧 Secure Email: amrameng@proton.me
- 🛡️ For urgent security assistance or consultation, feel free to reach out via ProtonMail or LinkedIn
Contributions are welcome! Please feel free to submit a Pull Request.