Skip to content

πŸ”Œ OSINT & Security Extensions for Marshall Browser - Installable plugins for enhanced reconnaissance and security testing

Notifications You must be signed in to change notification settings

bad-antics/marshall-extensions

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”Œ Marshall Extensions

Security & OSINT Extensions for Marshall Browser

License: MIT Marshall Rust Go TypeScript


A curated collection of security-focused browser extensions with multi-layered sandbox isolation and honeypot detection.

Extensions β€’ Installation β€’ Sandbox β€’ Development β€’ Documentation


🎯 Overview

Marshall Extensions provides a growing ecosystem of security and OSINT tools that integrate directly into the Marshall Browser. Every extension runs inside a hardened sandbox with:

  • πŸ” AES-256-GCM encrypted communication
  • πŸ¦€ Rust-based process isolation (seccomp-bpf, namespaces)
  • 🍯 Go honeypot system for detecting malicious behavior
  • πŸ“Š Behavioral threat scoring with automatic containment

πŸ“¦ Available Extensions

πŸ” Reconnaissance

Extension Description Language
Shodan Lookup Query Shodan.io for IP/domain intelligence, open ports, vulnerabilities JavaScript
WHOIS Inspector Detailed domain registration info, registrar history, name servers JavaScript
DNS Analyzer DNS record enumeration, zone transfers, subdomain discovery JavaScript
Wayback Machine View historical snapshots of any webpage JavaScript

⚑ Vulnerability Assessment

Extension Description Language
XSS Scanner Detect reflected, stored, and DOM-based XSS vulnerabilities JavaScript
Header Analyzer Security header analysis (CSP, HSTS, X-Frame-Options) with recommendations JavaScript
Cert Inspector SSL/TLS certificate analysis, chain validation, grading Ruby
SQLi Detector SQL injection point detection and payload testing JavaScript

πŸ“‘ Network Analysis

Extension Description Language
Traffic Analyzer Real-time network monitoring, anomaly detection, traffic patterns TypeScript
Request Tamper HTTP interception, modification, replay attacks Lua
WebSocket Inspector Monitor and modify WebSocket connections TypeScript
Cookie Manager Advanced cookie analysis, modification, and export JavaScript

🧠 Forensics

Extension Description Language
Memory Forensics Memory artifact detection, shellcode patterns, process injection C
JS Deobfuscator Unpack and analyze obfuscated JavaScript JavaScript
Metadata Extractor Extract EXIF, document metadata from files Python

��️ Utilities

Extension Description Language
Request Logger Log and export all HTTP requests/responses JavaScript
Response Beautifier Format JSON, XML, HTML responses JavaScript
Hash Calculator MD5, SHA-1, SHA-256, SHA-512 hash generation JavaScript
Encoder/Decoder Base64, URL, HTML entity encoding/decoding JavaScript
Screenshot Tool Full page and element screenshots JavaScript

πŸš€ Installation

Method 1: Marshall Extension Manager (Recommended)

  1. Open Marshall Browser
  2. Navigate to Settings β†’ Extensions
  3. Click "Browse Repository"
  4. Select extensions to install
  5. Grant required permissions

Method 2: Manual Installation

# Clone the repository
git clone https://github.com/bad-antics/marshall-extensions.git

# Copy extension to Marshall extensions directory
cp -r marshall-extensions/extensions/recon/shodan-lookup ~/.marshall/extensions/

# Restart Marshall Browser
marshall --reload-extensions

Method 3: Install from URL

# Install directly from GitHub
marshall --install-extension https://github.com/bad-antics/marshall-extensions/releases/download/v1.0.0/shodan-lookup.mext

πŸ”’ Sandbox Architecture

All extensions execute in a multi-layered security sandbox that isolates untrusted code and detects malicious behavior.

flowchart TB
    subgraph Browser["🌐 Marshall Browser"]
        subgraph CommLayer["πŸ“‘ Secure Communication Layer<br/><i>TypeScript β€’ AES-256-GCM</i>"]
            ECDH["πŸ”‘ ECDH Key Exchange"]
            Sign["✍️ Message Signing"]
            Replay["πŸ›‘οΈ Replay Protection"]
        end
        
        subgraph SandboxCore["πŸ¦€ Sandbox Core<br/><i>Rust β€’ libseccomp</i>"]
            Isolation["πŸ”’ Process Isolation"]
            Verify["βœ… Ed25519 Verification"]
            Threat["⚠️ Threat Detection"]
        end
        
        subgraph Honeypot["🍯 Honeypot System<br/><i>Go β€’ Deception</i>"]
            NetHP["🌐 Network"]
            ApiHP["πŸ”Œ API"]
            FileHP["πŸ“ File"]
            DataHP["πŸ”‘ Data"]
        end
    end
    
    Ext["🧩 Extension"] ==> CommLayer
    CommLayer ==> SandboxCore
    SandboxCore ==> Honeypot
    Threat -.->|"Score > 50"| Honeypot
Loading

Security Layers

Layer Component Technology Purpose
1 Communication TypeScript AES-256-GCM encryption, ECDH key exchange
2 Sandbox Core Rust seccomp-bpf syscall filtering, namespace isolation
3 Honeypot Go Fake services, credential honeytokens, intrusion detection

Threat Detection

The sandbox monitors all extension behavior and assigns threat scores:

Indicator Score Action
Blocked API call +10 Log warning
Excessive network requests +5 Rate limit
Unauthorized file access +15 Deny + alert
Credential harvesting attempt +25 Honeypot redirect
Process/memory scanning +20 Terminate
Score > 50 β€” Full honeypot containment

Permission System

Extensions must declare required permissions in their manifest:

{
  "permissions": [
    "activeTab",      // Access current tab
    "network",        // Make HTTP requests
    "storage",        // Persistent storage
    "dom",            // Page DOM access
    "clipboard",      // Clipboard access
    "notifications"   // System notifications
  ]
}

πŸ› οΈ Extension Development

Quick Start

# Create new extension from template
marshall-cli create-extension my-extension

# Structure created:
my-extension/
β”œβ”€β”€ manifest.json    # Extension metadata
β”œβ”€β”€ main.js          # Entry point
β”œβ”€β”€ icon.png         # 128x128 icon
└── README.md        # Documentation

Manifest Schema

{
  "name": "My Extension",
  "version": "1.0.0",
  "description": "What this extension does",
  "author": "your-username",
  "homepage": "https://github.com/your-username/my-extension",
  "permissions": ["activeTab", "network"],
  "main": "main.js",
  "icon": "icon.png",
  "category": "recon",
  "marshall_version": ">=1.0.0"
}

Marshall Extension API

// Get current tab info
const tab = await marshall.tabs.getCurrent();
console.log(tab.url, tab.title);

// Make network request (sandboxed)
const response = await marshall.network.fetch('https://api.example.com/data', {
  method: 'GET',
  headers: { 'X-API-Key': apiKey }
});
const data = await response.json();

// Store data persistently
await marshall.storage.set('lastResult', data);
const stored = await marshall.storage.get('lastResult');

// Show UI panel
marshall.ui.showPanel(`
  <div class="result">
    <h2>Results</h2>
    <pre>${JSON.stringify(data, null, 2)}</pre>
  </div>
`);

// Send notification
marshall.ui.notify('Scan complete!', 'success');

// Access page DOM (requires 'dom' permission)
const pageContent = await marshall.dom.evaluate(() => {
  return document.body.innerHTML;
});

Categories

Category Description
recon Reconnaissance & OSINT
vuln Vulnerability assessment
network Network analysis
forensics Digital forensics
utility General utilities

πŸ“ Project Structure

marshall-extensions/
β”œβ”€β”€ sandbox/                      # Security sandbox system
β”‚   β”œβ”€β”€ core/                     # Rust sandbox runtime
β”‚   β”‚   β”œβ”€β”€ src/
β”‚   β”‚   β”‚   β”œβ”€β”€ lib.rs            # Sandbox entry point
β”‚   β”‚   β”‚   β”œβ”€β”€ isolation.rs      # Process isolation (seccomp, namespaces)
β”‚   β”‚   β”‚   β”œβ”€β”€ verification.rs   # Ed25519 signature verification
β”‚   β”‚   β”‚   β”œβ”€β”€ permissions.rs    # Permission enforcement
β”‚   β”‚   β”‚   └── threat.rs         # Threat scoring engine
β”‚   β”‚   └── Cargo.toml
β”‚   β”œβ”€β”€ honeypot/                 # Go deception system
β”‚   β”‚   β”œβ”€β”€ main.go               # Honeypot services
β”‚   β”‚   β”œβ”€β”€ network.go            # Fake network services
β”‚   β”‚   β”œβ”€β”€ api.go                # Fake API endpoints
β”‚   β”‚   └── go.mod
β”‚   └── comm/                     # TypeScript secure channel
β”‚       β”œβ”€β”€ channel.ts            # Encrypted IPC
β”‚       β”œβ”€β”€ crypto.ts             # AES-256-GCM, ECDH
β”‚       └── package.json
β”œβ”€β”€ extensions/
β”‚   β”œβ”€β”€ recon/                    # Reconnaissance extensions
β”‚   β”‚   β”œβ”€β”€ shodan-lookup/
β”‚   β”‚   β”œβ”€β”€ whois-inspector/
β”‚   β”‚   └── dns-analyzer/
β”‚   β”œβ”€β”€ vuln/                     # Vulnerability extensions
β”‚   β”‚   β”œβ”€β”€ xss-scanner/
β”‚   β”‚   β”œβ”€β”€ header-analyzer/
β”‚   β”‚   └── cert-inspector/       # Ruby
β”‚   β”œβ”€β”€ network/                  # Network extensions
β”‚   β”‚   β”œβ”€β”€ traffic-analyzer/     # TypeScript
β”‚   β”‚   └── request-tamper/       # Lua
β”‚   β”œβ”€β”€ forensics/                # Forensics extensions
β”‚   β”‚   └── memory-forensics/     # C
β”‚   └── utility/                  # Utility extensions
β”œβ”€β”€ lib/                          # Shared libraries
β”‚   β”œβ”€β”€ marshall-api.js           # Extension API
β”‚   └── common-utils.js           # Utilities
β”œβ”€β”€ docs/                         # Documentation
β”‚   β”œβ”€β”€ Home.md
β”‚   β”œβ”€β”€ Sandbox-Architecture.md
β”‚   └── Extension-Development.md
└── README.md

πŸ“– Documentation

Document Description
Sandbox Architecture Deep dive into the security sandbox
Extension Development Complete API reference and guides
Contributing How to contribute extensions

⚠️ Disclaimer

These extensions are provided for educational and authorized security testing purposes only.

  • βœ… Use on systems you own or have explicit permission to test
  • ❌ Do not use for unauthorized access or malicious purposes
  • πŸ“œ Follow all applicable laws and regulations

🀝 Contributing

We welcome contributions! Here's how to submit a new extension:

  1. Fork this repository
  2. Create your extension in extensions/<category>/
  3. Include manifest.json, main.js, icon.png, and README.md
  4. Test with marshall --test-extension ./your-extension
  5. Submit a pull request

See CONTRIBUTING.md for detailed guidelines.


πŸ“„ License

MIT License β€” See LICENSE for details.


πŸ”— Related Projects

Project Description
Marshall Browser The privacy-focused browser
NullSec Tools Comprehensive security toolkit
NullSec Linux Security-focused Linux distribution

Part of the NullSec Security Suite

Built by bad-antics

Discord Website

About

πŸ”Œ OSINT & Security Extensions for Marshall Browser - Installable plugins for enhanced reconnaissance and security testing

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published