๐Ÿ”Œ Marshall Extensions

February 27, 2026 ยท View on GitHub

๐Ÿ”Œ Marshall Extensions

Security & OSINT Extensions for Marshall Browser

License: MIT Marshall Rust Go TypeScript


A curated collection of security-focused browser extensions with multi-layered sandbox isolation and honeypot detection.

Extensions โ€ข Installation โ€ข Sandbox โ€ข Development โ€ข Documentation


๐ŸŽฏ Overview

Marshall Extensions provides a growing ecosystem of security and OSINT tools that integrate directly into the Marshall Browser. Every extension runs inside a hardened sandbox with:

  • ๐Ÿ” AES-256-GCM encrypted communication
  • ๐Ÿฆ€ Rust-based process isolation (seccomp-bpf, namespaces)
  • ๐Ÿฏ Go honeypot system for detecting malicious behavior
  • ๐Ÿ“Š Behavioral threat scoring with automatic containment

๐Ÿ“ฆ Available Extensions

๐Ÿ” Reconnaissance

ExtensionDescriptionLanguage
Shodan LookupQuery Shodan.io for IP/domain intelligence, open ports, vulnerabilitiesJavaScript
WHOIS InspectorDetailed domain registration info, registrar history, name serversJavaScript
DNS AnalyzerDNS record enumeration, zone transfers, subdomain discoveryJavaScript
Wayback MachineView historical snapshots of any webpageJavaScript

โšก Vulnerability Assessment

ExtensionDescriptionLanguage
XSS ScannerDetect reflected, stored, and DOM-based XSS vulnerabilitiesJavaScript
Header AnalyzerSecurity header analysis (CSP, HSTS, X-Frame-Options) with recommendationsJavaScript
Cert InspectorSSL/TLS certificate analysis, chain validation, gradingRuby
SQLi DetectorSQL injection point detection and payload testingJavaScript

๐Ÿ“ก Network Analysis

ExtensionDescriptionLanguage
Traffic AnalyzerReal-time network monitoring, anomaly detection, traffic patternsTypeScript
Request TamperHTTP interception, modification, replay attacksLua
WebSocket InspectorMonitor and modify WebSocket connectionsTypeScript
Cookie ManagerAdvanced cookie analysis, modification, and exportJavaScript

๐Ÿง  Forensics

ExtensionDescriptionLanguage
Memory ForensicsMemory artifact detection, shellcode patterns, process injectionC
JS DeobfuscatorUnpack and analyze obfuscated JavaScriptJavaScript
Metadata ExtractorExtract EXIF, document metadata from filesPython

๏ฟฝ๏ฟฝ๏ธ Utilities

ExtensionDescriptionLanguage
Request LoggerLog and export all HTTP requests/responsesJavaScript
Response BeautifierFormat JSON, XML, HTML responsesJavaScript
Hash CalculatorMD5, SHA-1, SHA-256, SHA-512 hash generationJavaScript
Encoder/DecoderBase64, URL, HTML entity encoding/decodingJavaScript
Screenshot ToolFull page and element screenshotsJavaScript

๐Ÿš€ Installation

  1. Open Marshall Browser
  2. Navigate to Settings โ†’ Extensions
  3. Click "Browse Repository"
  4. Select extensions to install
  5. Grant required permissions

Method 2: Manual Installation

# Clone the repository
git clone https://github.com/bad-antics/marshall-extensions.git

# Copy extension to Marshall extensions directory
cp -r marshall-extensions/extensions/recon/shodan-lookup ~/.marshall/extensions/

# Restart Marshall Browser
marshall --reload-extensions

Method 3: Install from URL

# Install directly from GitHub
marshall --install-extension https://github.com/bad-antics/marshall-extensions/releases/download/v1.0.0/shodan-lookup.mext

๐Ÿ”’ Sandbox Architecture

All extensions execute in a multi-layered security sandbox that isolates untrusted code and detects malicious behavior.

flowchart TB
    subgraph Browser["๐ŸŒ Marshall Browser"]
        subgraph CommLayer["๐Ÿ“ก Secure Communication Layer<br/><i>TypeScript โ€ข AES-256-GCM</i>"]
            ECDH["๐Ÿ”‘ ECDH Key Exchange"]
            Sign["โœ๏ธ Message Signing"]
            Replay["๐Ÿ›ก๏ธ Replay Protection"]
        end
        
        subgraph SandboxCore["๐Ÿฆ€ Sandbox Core<br/><i>Rust โ€ข libseccomp</i>"]
            Isolation["๐Ÿ”’ Process Isolation"]
            Verify["โœ… Ed25519 Verification"]
            Threat["โš ๏ธ Threat Detection"]
        end
        
        subgraph Honeypot["๐Ÿฏ Honeypot System<br/><i>Go โ€ข Deception</i>"]
            NetHP["๐ŸŒ Network"]
            ApiHP["๐Ÿ”Œ API"]
            FileHP["๐Ÿ“ File"]
            DataHP["๐Ÿ”‘ Data"]
        end
    end
    
    Ext["๐Ÿงฉ Extension"] ==> CommLayer
    CommLayer ==> SandboxCore
    SandboxCore ==> Honeypot
    Threat -.->|"Score > 50"| Honeypot

Security Layers

LayerComponentTechnologyPurpose
1CommunicationTypeScriptAES-256-GCM encryption, ECDH key exchange
2Sandbox CoreRustseccomp-bpf syscall filtering, namespace isolation
3HoneypotGoFake services, credential honeytokens, intrusion detection

Threat Detection

The sandbox monitors all extension behavior and assigns threat scores:

IndicatorScoreAction
Blocked API call+10Log warning
Excessive network requests+5Rate limit
Unauthorized file access+15Deny + alert
Credential harvesting attempt+25Honeypot redirect
Process/memory scanning+20Terminate
Score > 50โ€”Full honeypot containment

Permission System

Extensions must declare required permissions in their manifest:

{
  "permissions": [
    "activeTab",      // Access current tab
    "network",        // Make HTTP requests
    "storage",        // Persistent storage
    "dom",            // Page DOM access
    "clipboard",      // Clipboard access
    "notifications"   // System notifications
  ]
}

๐Ÿ› ๏ธ Extension Development

Quick Start

# Create new extension from template
marshall-cli create-extension my-extension

# Structure created:
my-extension/
โ”œโ”€โ”€ manifest.json    # Extension metadata
โ”œโ”€โ”€ main.js          # Entry point
โ”œโ”€โ”€ icon.png         # 128x128 icon
โ””โ”€โ”€ README.md        # Documentation

Manifest Schema

{
  "name": "My Extension",
  "version": "1.0.0",
  "description": "What this extension does",
  "author": "your-username",
  "homepage": "https://github.com/your-username/my-extension",
  "permissions": ["activeTab", "network"],
  "main": "main.js",
  "icon": "icon.png",
  "category": "recon",
  "marshall_version": ">=1.0.0"
}

Marshall Extension API

// Get current tab info
const tab = await marshall.tabs.getCurrent();
console.log(tab.url, tab.title);

// Make network request (sandboxed)
const response = await marshall.network.fetch('https://api.example.com/data', {
  method: 'GET',
  headers: { 'X-API-Key': apiKey }
});
const data = await response.json();

// Store data persistently
await marshall.storage.set('lastResult', data);
const stored = await marshall.storage.get('lastResult');

// Show UI panel
marshall.ui.showPanel(`
  <div class="result">
    <h2>Results</h2>
    <pre>${JSON.stringify(data, null, 2)}</pre>
  </div>
`);

// Send notification
marshall.ui.notify('Scan complete!', 'success');

// Access page DOM (requires 'dom' permission)
const pageContent = await marshall.dom.evaluate(() => {
  return document.body.innerHTML;
});

Categories

CategoryDescription
reconReconnaissance & OSINT
vulnVulnerability assessment
networkNetwork analysis
forensicsDigital forensics
utilityGeneral utilities

๐Ÿ“ Project Structure

marshall-extensions/
โ”œโ”€โ”€ sandbox/                      # Security sandbox system
โ”‚   โ”œโ”€โ”€ core/                     # Rust sandbox runtime
โ”‚   โ”‚   โ”œโ”€โ”€ src/
โ”‚   โ”‚   โ”‚   โ”œโ”€โ”€ lib.rs            # Sandbox entry point
โ”‚   โ”‚   โ”‚   โ”œโ”€โ”€ isolation.rs      # Process isolation (seccomp, namespaces)
โ”‚   โ”‚   โ”‚   โ”œโ”€โ”€ verification.rs   # Ed25519 signature verification
โ”‚   โ”‚   โ”‚   โ”œโ”€โ”€ permissions.rs    # Permission enforcement
โ”‚   โ”‚   โ”‚   โ””โ”€โ”€ threat.rs         # Threat scoring engine
โ”‚   โ”‚   โ””โ”€โ”€ Cargo.toml
โ”‚   โ”œโ”€โ”€ honeypot/                 # Go deception system
โ”‚   โ”‚   โ”œโ”€โ”€ main.go               # Honeypot services
โ”‚   โ”‚   โ”œโ”€โ”€ network.go            # Fake network services
โ”‚   โ”‚   โ”œโ”€โ”€ api.go                # Fake API endpoints
โ”‚   โ”‚   โ””โ”€โ”€ go.mod
โ”‚   โ””โ”€โ”€ comm/                     # TypeScript secure channel
โ”‚       โ”œโ”€โ”€ channel.ts            # Encrypted IPC
โ”‚       โ”œโ”€โ”€ crypto.ts             # AES-256-GCM, ECDH
โ”‚       โ””โ”€โ”€ package.json
โ”œโ”€โ”€ extensions/
โ”‚   โ”œโ”€โ”€ recon/                    # Reconnaissance extensions
โ”‚   โ”‚   โ”œโ”€โ”€ shodan-lookup/
โ”‚   โ”‚   โ”œโ”€โ”€ whois-inspector/
โ”‚   โ”‚   โ””โ”€โ”€ dns-analyzer/
โ”‚   โ”œโ”€โ”€ vuln/                     # Vulnerability extensions
โ”‚   โ”‚   โ”œโ”€โ”€ xss-scanner/
โ”‚   โ”‚   โ”œโ”€โ”€ header-analyzer/
โ”‚   โ”‚   โ””โ”€โ”€ cert-inspector/       # Ruby
โ”‚   โ”œโ”€โ”€ network/                  # Network extensions
โ”‚   โ”‚   โ”œโ”€โ”€ traffic-analyzer/     # TypeScript
โ”‚   โ”‚   โ””โ”€โ”€ request-tamper/       # Lua
โ”‚   โ”œโ”€โ”€ forensics/                # Forensics extensions
โ”‚   โ”‚   โ””โ”€โ”€ memory-forensics/     # C
โ”‚   โ””โ”€โ”€ utility/                  # Utility extensions
โ”œโ”€โ”€ lib/                          # Shared libraries
โ”‚   โ”œโ”€โ”€ marshall-api.js           # Extension API
โ”‚   โ””โ”€โ”€ common-utils.js           # Utilities
โ”œโ”€โ”€ docs/                         # Documentation
โ”‚   โ”œโ”€โ”€ Home.md
โ”‚   โ”œโ”€โ”€ Sandbox-Architecture.md
โ”‚   โ””โ”€โ”€ Extension-Development.md
โ””โ”€โ”€ README.md

๐Ÿ“– Documentation

DocumentDescription
Sandbox ArchitectureDeep dive into the security sandbox
Extension DevelopmentComplete API reference and guides
ContributingHow to contribute extensions

โš ๏ธ Disclaimer

These extensions are provided for educational and authorized security testing purposes only.

  • โœ… Use on systems you own or have explicit permission to test
  • โŒ Do not use for unauthorized access or malicious purposes
  • ๐Ÿ“œ Follow all applicable laws and regulations

๐Ÿค Contributing

We welcome contributions! Here's how to submit a new extension:

  1. Fork this repository
  2. Create your extension in extensions/<category>/
  3. Include manifest.json, main.js, icon.png, and README.md
  4. Test with marshall --test-extension ./your-extension
  5. Submit a pull request

See CONTRIBUTING.md for detailed guidelines.


๐Ÿ“„ License

MIT License โ€” See LICENSE for details.


ProjectDescription
Marshall BrowserThe privacy-focused browser
NullSec ToolsComprehensive security toolkit
NullSec LinuxSecurity-focused Linux distribution

Part of the NullSec Security Suite

Built by bad-antics

X/Twitter Website