Collected molecules will appear here. Add from search or explore.
A curated collection of malicious browser extension samples (CRX files) and research documentation for security training and analysis.
Defensibility
stars
3
The project is a small, personal collection of malware samples and research links. With only 3 stars and 0 forks, it lacks any meaningful adoption or community momentum. From a competitive standpoint, it is a 'data-as-code' repository rather than a software project. It serves as a training set for a secondary project ('ExterminAI'), but as an independent entity, it has no moat. The defensibility is minimal because larger platforms like VirusTotal, Any.Run, or specialized security vendors (CrowdStrike, Mandiant) maintain significantly more comprehensive, automated, and updated repositories of malicious browser extensions. The displacement risk is high because a security researcher could aggregate a similar or better dataset in a single afternoon using automated scrapers or existing malware feeds. Frontier labs are unlikely to compete directly as this is a niche security artifact collection, but the utility of such a small manual collection is rapidly depreciating as automated threat detection improves.
TECH STACK
INTEGRATION
reference_implementation
READINESS