Is "GreasePanda" on Chrome Web Store Safe to Install?

[email protected] · chrome · v2.2.0

GreasePanda gives you the power to shape the web your way. Install, manage, and sync powerful userscripts effortlessly with a sleek, modern interface. ✨ Key Features: ✦ Instant modify your favourite websites. ✦ Fastest userscript manager among all. ✦ One-click custom website scripts. ✦ Lightweight. ✦ Built-in script marketplace. ✦ Smart Script Control: Enable, disable, or toggle all scripts per site instantly. ✦ Easy Import & Export: Backup or restore your userscripts in one click. ✦ Cloud Sync: Securely sync your scripts with Google Drive integration. ✦ Auto Site Detection: Runs scripts only where they match — no manual setup needed. ✦ Custom Themes & Layouts: Switch between light/dark mode and grid/list view. ✦ Marketplace Integration: Browse and install scripts directly from GreasyFork & OpenUserJS. ✦ Privacy First: Your scripts stay on your device — you control what runs where.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

817 security findings detected across all analyzers

Chrome extension requesting 15 permissions

Severity Breakdown

0
Critical
3
High
641
Medium
173
Low
0
Info

Finding Categories

3
Obfuscation
22
Network
615
IoC Indicators

YARA Rules Matched

14 rules(173 hits)
postinstall file manipulation postinstall system command postinstall environment access postinstall network communication LocalStorageShouldNotBeUsed postinstall crypto operations postinstall file download postinstall obfuscation DebuggerStatementsShouldNotBeUsed credential env files postinstall persistence mechanism NoUseWeakRandom SQLInjection OriginsNotVerified

Requested Permissions

15 permissions
http://*/*
Dangerous
https://*/*
Dangerous
<all_urls>

Access and modify data on every website you visit

Dangerous
identity

Access your identity and sign-in tokens

High
cookies

Read and modify cookies on all sites

High
downloads

Manage, modify, and monitor downloads

High
activeTab
Medium
tabs
Medium
storage
Low
scripting
Low
webNavigation
Low
contextMenus
Low
userScripts
Low
notifications
Low
clipboardWrite
Low

About This Extension

GreasePanda gives you the power to shape the web your way. Install, manage, and sync powerful userscripts effortlessly with a sleek, modern interface. ✨ Key Features: ✦ Instant modify your favourite websites. ✦ Fastest userscript manager among all. ✦ One-click custom website scripts. ✦ Lightweight. ✦ Built-in script marketplace. ✦ Smart Script Control: Enable, disable, or toggle all scripts per site instantly. ✦ Easy Import & Export: Backup or restore your userscripts in one click. ✦ Cloud Sync: Securely sync your scripts with Google Drive integration. ✦ Auto Site Detection: Runs scripts only where they match — no manual setup needed. ✦ Custom Themes & Layouts: Switch between light/dark mode and grid/list view. ✦ Marketplace Integration: Browse and install scripts directly from GreasyFork & OpenUserJS. ✦ Privacy First: Your scripts stay on your device — you control what runs where.

Detailed Findings

199 total

YARA Rule Matches

14 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
173
IP Addresses
71
Domains
433
Strings
615

All Indicators · 615

Domain
detected Domain: lodash.prototype.next

XIOC detected Domain: lodash.prototype.next

extracted_from_files

Domain
detected Domain: udaharan.com

XIOC detected Domain: udaharan.com

extracted_from_files

Domain
detected Domain: exemple.com

XIOC detected Domain: exemple.com

extracted_from_files

Domain
detected Domain: mesal.ir

XIOC detected Domain: mesal.ir

extracted_from_files

Domain
detected Domain: isinstalled.id

XIOC detected Domain: isinstalled.id

extracted_from_files

Domain
detected Domain: sender.tab.id

XIOC detected Domain: sender.tab.id

extracted_from_files

Domain
detected Domain: sender.tab

XIOC detected Domain: sender.tab

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: misaal.pk

XIOC detected Domain: misaal.pk

extracted_from_files

Domain
detected Domain: ornek.com

XIOC detected Domain: ornek.com

extracted_from_files

Domain
detected Domain: exemplo.com

XIOC detected Domain: exemplo.com

extracted_from_files

Domain
detected Domain: event.data.data

XIOC detected Domain: event.data.data

extracted_from_files

Domain
detected Domain: event.data

XIOC detected Domain: event.data

extracted_from_files

IP
detected Domain: script.author

XIOC detected Domain: script.author

extracted_from_files

IP
detected Domain: script.name

XIOC detected Domain: script.name

extracted_from_files

IP
detected Domain: script.id

XIOC detected Domain: script.id

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: tabs.map

XIOC detected Domain: tabs.map

extracted_from_files

IP
detected Domain: existingscript.author

XIOC detected Domain: existingscript.author

extracted_from_files

IP
detected Domain: scriptdata.name

XIOC detected Domain: scriptdata.name

extracted_from_files

IP
detected Domain: existingscript.name

XIOC detected Domain: existingscript.name

extracted_from_files

URL
detected Domain: urlobj.search

XIOC detected Domain: urlobj.search

extracted_from_files

Domain
detected Domain: window.gm

XIOC detected Domain: window.gm

extracted_from_files

Domain
detected Domain: textarea.select

XIOC detected Domain: textarea.select

extracted_from_files

Domain
detected Domain: details.data

XIOC detected Domain: details.data

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: f2.call

XIOC detected Domain: f2.call

extracted_from_files

Domain
detected Domain: delta.id

XIOC detected Domain: delta.id

extracted_from_files

Domain
detected Domain: chrome.downloads.download

XIOC detected Domain: chrome.downloads.download

extracted_from_files

Domain
detected Domain: details.name

XIOC detected Domain: details.name

extracted_from_files

Domain
detected Domain: duplicatecheck.id

XIOC detected Domain: duplicatecheck.id

extracted_from_files

IP
detected Domain: scriptdata.author

XIOC detected Domain: scriptdata.author

extracted_from_files

Domain
detected Domain: jf.now

XIOC detected Domain: jf.now

extracted_from_files

Domain
detected Domain: qg.now

XIOC detected Domain: qg.now

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: t.id-e.id

XIOC detected Domain: t.id-e.id

extracted_from_files

Domain
detected Domain: hg.call

XIOC detected Domain: hg.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: xm.call

XIOC detected Domain: xm.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: e.media

XIOC detected Domain: e.media

extracted_from_files

Domain
detected Domain: e.as

XIOC detected Domain: e.as

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: cn.next

XIOC detected Domain: cn.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: o.events

XIOC detected Domain: o.events

extracted_from_files

Domain
detected Domain: w.next

XIOC detected Domain: w.next

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: n.compare

XIOC detected Domain: n.compare

extracted_from_files

Domain
detected Domain: e.events

XIOC detected Domain: e.events

extracted_from_files

Domain
detected Domain: a.data

XIOC detected Domain: a.data

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: i.data.map

XIOC detected Domain: i.data.map

extracted_from_files

Domain
detected Domain: xt.next

XIOC detected Domain: xt.next

extracted_from_files

Domain
detected Domain: x.top

XIOC detected Domain: x.top

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: s.memoizedprops.style

XIOC detected Domain: s.memoizedprops.style

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: n.property

XIOC detected Domain: n.property

extracted_from_files

Domain
detected Domain: t.events

XIOC detected Domain: t.events

extracted_from_files

Domain
detected Domain: i.is

XIOC detected Domain: i.is

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: m.data

XIOC detected Domain: m.data

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

Domain
detected Domain: f.target

XIOC detected Domain: f.target

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: o.info

XIOC detected Domain: o.info

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: ru.call

XIOC detected Domain: ru.call

extracted_from_files

Domain
detected Domain: i.media

XIOC detected Domain: i.media

extracted_from_files

Domain
detected Domain: n.media

XIOC detected Domain: n.media

extracted_from_files

Domain
detected Domain: a.green

XIOC detected Domain: a.green

extracted_from_files

Domain
detected Domain: i.red

XIOC detected Domain: i.red

extracted_from_files

Domain
detected Domain: n.red

XIOC detected Domain: n.red

extracted_from_files

Domain
detected Domain: a.red

XIOC detected Domain: a.red

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: a.delta

XIOC detected Domain: a.delta

extracted_from_files

Domain
detected Domain: x.next

XIOC detected Domain: x.next

extracted_from_files

Domain
detected Domain: dt.now

XIOC detected Domain: dt.now

extracted_from_files

Domain
detected Domain: i.blue

XIOC detected Domain: i.blue

extracted_from_files

Domain
detected Domain: n.blue

XIOC detected Domain: n.blue

extracted_from_files

Domain
detected Domain: a.blue

XIOC detected Domain: a.blue

extracted_from_files

Domain
detected Domain: i.green

XIOC detected Domain: i.green

extracted_from_files

Domain
detected Domain: n.green

XIOC detected Domain: n.green

extracted_from_files

Domain
detected Domain: object.hasownproperty.call

XIOC detected Domain: object.hasownproperty.call

extracted_from_files

Domain
detected Domain: this.animation.play

XIOC detected Domain: this.animation.play

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: this.driver.now

XIOC detected Domain: this.driver.now

extracted_from_files

Domain
detected Domain: this.play

XIOC detected Domain: this.play

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: s.props.style

XIOC detected Domain: s.props.style

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: this.build

XIOC detected Domain: this.build

extracted_from_files

Domain
detected Domain: this.props.style

XIOC detected Domain: this.props.style

extracted_from_files

Domain
detected Domain: h.target

XIOC detected Domain: h.target

extracted_from_files

Domain
detected Domain: this.events

XIOC detected Domain: this.events

extracted_from_files

Domain
detected Domain: this.relativeparent.target

XIOC detected Domain: this.relativeparent.target

extracted_from_files

Domain
detected Domain: ya.read

XIOC detected Domain: ya.read

extracted_from_files

Domain
detected Domain: yt.delta

XIOC detected Domain: yt.delta

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: e.show

XIOC detected Domain: e.show

extracted_from_files

Domain
detected Domain: w.map

XIOC detected Domain: w.map

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: notification.show

XIOC detected Domain: notification.show

extracted_from_files

Domain
detected Domain: n.group

XIOC detected Domain: n.group

extracted_from_files

Domain
detected Domain: this.visualelement.projection.target

XIOC detected Domain: this.visualelement.projection.target

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: u.target

XIOC detected Domain: u.target

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: metadata.author

XIOC detected Domain: metadata.author

extracted_from_files

Domain
detected Domain: a.click

XIOC detected Domain: a.click

extracted_from_files

Domain
detected Domain: a.download

XIOC detected Domain: a.download

extracted_from_files

Domain
detected Domain: s.id

XIOC detected Domain: s.id

extracted_from_files

Domain
detected Domain: metadata.name

XIOC detected Domain: metadata.name

extracted_from_files

Domain
detected Domain: event.data.id

XIOC detected Domain: event.data.id

extracted_from_files

Domain
detected Domain: tampermonkey.net

XIOC detected Domain: tampermonkey.net

extracted_from_files

Domain
detected Domain: style.id

XIOC detected Domain: style.id

extracted_from_files

Domain
detected Domain: greasyfork.org

XIOC detected Domain: greasyfork.org

extracted_from_files

Domain
detected Domain: update.greasyfork.org

XIOC detected Domain: update.greasyfork.org

extracted_from_files

Domain
detected Domain: cursor.to

XIOC detected Domain: cursor.to

extracted_from_files

Domain
detected Domain: btn.dataset.id

XIOC detected Domain: btn.dataset.id

extracted_from_files

Domain
detected Domain: item.dataset.id

XIOC detected Domain: item.dataset.id

extracted_from_files

Domain
detected Domain: recent.map

XIOC detected Domain: recent.map

extracted_from_files

Domain
detected Domain: crl.adobe.com

XIOC detected Domain: crl.adobe.com

extracted_from_files

Domain
detected Domain: pki-ocsp.symauth.com

XIOC detected Domain: pki-ocsp.symauth.com

extracted_from_files

Domain
detected Domain: pki-crl.symauth.com

XIOC detected Domain: pki-crl.symauth.com

extracted_from_files

Domain
detected Domain: c2pa.hash.data

XIOC detected Domain: c2pa.hash.data

extracted_from_files

IP
detected Domain: cv.iptc.org

XIOC detected Domain: cv.iptc.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: m.bt

XIOC detected Domain: m.bt

extracted_from_files

Domain
detected Domain: a.pe

XIOC detected Domain: a.pe

extracted_from_files

Domain
detected Domain: www.digicert.com

XIOC detected Domain: www.digicert.com

extracted_from_files

Domain
detected Domain: crl3.digicert.com

XIOC detected Domain: crl3.digicert.com

extracted_from_files

Domain
detected Domain: cacerts.digicert.com

XIOC detected Domain: cacerts.digicert.com

extracted_from_files

Domain
detected Domain: ocsp.digicert.com

XIOC detected Domain: ocsp.digicert.com

extracted_from_files

Domain
detected Domain: www.adobe.com

XIOC detected Domain: www.adobe.com

extracted_from_files

Domain
detected Domain: 9h.mm

XIOC detected Domain: 9h.mm

extracted_from_files

Domain
detected Domain: n.sv

XIOC detected Domain: n.sv

extracted_from_files

Domain
detected Domain: qt8.vg

XIOC detected Domain: qt8.vg

extracted_from_files

Domain
detected Domain: ߖ.ad

XIOC detected Domain: ߖ.ad

extracted_from_files

Domain
detected Domain: 3g.md

XIOC detected Domain: 3g.md

extracted_from_files

Domain
detected Domain: 2q.ve

XIOC detected Domain: 2q.ve

extracted_from_files

Domain
detected Domain: 6y.im

XIOC detected Domain: 6y.im

extracted_from_files

Domain
detected Domain: element.style

XIOC detected Domain: element.style

extracted_from_files

Domain
detected Domain: selectors.map

XIOC detected Domain: selectors.map

extracted_from_files

IP
detected Domain: scriptinfo.author

XIOC detected Domain: scriptinfo.author

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

IP
detected Domain: scriptinfo.name

XIOC detected Domain: scriptinfo.name

extracted_from_files

Domain
detected Domain: toggle.click

XIOC detected Domain: toggle.click

extracted_from_files

IP
detected Domain: scriptb.name

XIOC detected Domain: scriptb.name

extracted_from_files

IP
detected Domain: scripta.name

XIOC detected Domain: scripta.name

extracted_from_files

Domain
detected Domain: gist.github.com

XIOC detected Domain: gist.github.com

extracted_from_files

Domain
detected Domain: openuserjs.org

XIOC detected Domain: openuserjs.org

extracted_from_files

Domain
detected Domain: sleazyfork.org

XIOC detected Domain: sleazyfork.org

extracted_from_files

Domain
detected Domain: chrome.storage

XIOC detected Domain: chrome.storage

extracted_from_files

Domain
detected Domain: originaladdeventlistener.call

XIOC detected Domain: originaladdeventlistener.call

extracted_from_files

Domain
detected Domain: msdn.microsoft.com

XIOC detected Domain: msdn.microsoft.com

extracted_from_files

IP
detected Domain: en.wikipedia.org

XIOC detected Domain: en.wikipedia.org

extracted_from_files

Domain
detected Domain: wiki.commonjs.org

XIOC detected Domain: wiki.commonjs.org

extracted_from_files

Domain
detected Domain: button.style.top

XIOC detected Domain: button.style.top

extracted_from_files

IP
detected Domain: currentscriptdata.name

XIOC detected Domain: currentscriptdata.name

extracted_from_files

IP
detected Domain: scriptb.author

XIOC detected Domain: scriptb.author

extracted_from_files

IP
detected Domain: scripta.author

XIOC detected Domain: scripta.author

extracted_from_files

Domain
detected Domain: eev.ee

XIOC detected Domain: eev.ee

extracted_from_files

Domain
detected Domain: mathiasbynens.be

XIOC detected Domain: mathiasbynens.be

extracted_from_files

Domain
detected Domain: ecma-international.org

XIOC detected Domain: ecma-international.org

extracted_from_files

Domain
detected Domain: npms.io

XIOC detected Domain: npms.io

extracted_from_files

Domain
detected Domain: underscorejs.org

XIOC detected Domain: underscorejs.org

extracted_from_files

Domain
detected Domain: openjsf.org

XIOC detected Domain: openjsf.org

extracted_from_files

Domain
detected Domain: lodash.com

XIOC detected Domain: lodash.com

extracted_from_files

Domain
detected Domain: css-tricks.com

XIOC detected Domain: css-tricks.com

extracted_from_files

Domain
detected Domain: peter.michaux.ca

XIOC detected Domain: peter.michaux.ca

extracted_from_files

Domain
detected Domain: www.ecma-international.org

XIOC detected Domain: www.ecma-international.org

extracted_from_files

Domain
detected Domain: es5.github.io

XIOC detected Domain: es5.github.io

extracted_from_files

Domain
detected Domain: bugs.chromium.org

XIOC detected Domain: bugs.chromium.org

extracted_from_files

Domain
detected Domain: mdn.io

XIOC detected Domain: mdn.io

extracted_from_files

Domain
detected Domain: bugs.webkit.org

XIOC detected Domain: bugs.webkit.org

extracted_from_files

Domain
detected Domain: requirejs.org

XIOC detected Domain: requirejs.org

extracted_from_files

Domain
detected Domain: ejohn.org

XIOC detected Domain: ejohn.org

extracted_from_files

Domain
detected Domain: developer.chrome.com

XIOC detected Domain: developer.chrome.com

extracted_from_files

Domain
detected Domain: www.html5rocks.com

XIOC detected Domain: www.html5rocks.com

extracted_from_files

Domain
detected Domain: wonko.com

XIOC detected Domain: wonko.com

extracted_from_files

Domain
detected Domain: mths.be

XIOC detected Domain: mths.be

extracted_from_files

Domain
detected Domain: www.npmjs.com

XIOC detected Domain: www.npmjs.com

extracted_from_files

Domain
detected Domain: inimino.org

XIOC detected Domain: inimino.org

extracted_from_files

Domain
detected Domain: blog.izs.me

XIOC detected Domain: blog.izs.me

extracted_from_files

Domain
detected Domain: jakearchibald.com

XIOC detected Domain: jakearchibald.com

extracted_from_files

IP
detected Domain: javascriptweblog.wordpress.com

XIOC detected Domain: javascriptweblog.wordpress.com

extracted_from_files

Domain
detected Domain: bocoup.com

XIOC detected Domain: bocoup.com

extracted_from_files

Domain
detected Domain: jshint.com

XIOC detected Domain: jshint.com

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: documentup.com

XIOC detected Domain: documentup.com

extracted_from_files

Domain
detected Domain: www.mozilla.org

XIOC detected Domain: www.mozilla.org

extracted_from_files

Domain
detected Domain: qunitjs.com

XIOC detected Domain: qunitjs.com

extracted_from_files

Domain
detected Domain: jasmine.github.io

XIOC detected Domain: jasmine.github.io

extracted_from_files

Domain
detected Domain: couchdb.apache.org

XIOC detected Domain: couchdb.apache.org

extracted_from_files

Domain
detected Domain: mootools.net

XIOC detected Domain: mootools.net

extracted_from_files

Domain
detected Domain: yuiblog.com

XIOC detected Domain: yuiblog.com

extracted_from_files

Domain
detected Domain: www.adequatelygood.com

XIOC detected Domain: www.adequatelygood.com

extracted_from_files

Domain
detected Domain: phantomjs.org

XIOC detected Domain: phantomjs.org

extracted_from_files

Domain
detected Domain: dojotoolkit.org

XIOC detected Domain: dojotoolkit.org

extracted_from_files

Domain
detected Domain: browserify.org

XIOC detected Domain: browserify.org

extracted_from_files

Domain
detected Domain: mochajs.org

XIOC detected Domain: mochajs.org

extracted_from_files

Domain
detected Domain: yuilibrary.com

XIOC detected Domain: yuilibrary.com

extracted_from_files

Domain
detected Domain: www.prototypejs.org

XIOC detected Domain: www.prototypejs.org

extracted_from_files

Domain
detected Domain: stackstartfunction.name

XIOC detected Domain: stackstartfunction.name

extracted_from_files

Domain
detected Domain: 280north.com

XIOC detected Domain: 280north.com

extracted_from_files

Domain
detected Domain: narwhaljs.org

XIOC detected Domain: narwhaljs.org

extracted_from_files

Domain
detected Domain: json.org

XIOC detected Domain: json.org

extracted_from_files

Domain
detected Domain: robertnyman.com

XIOC detected Domain: robertnyman.com

extracted_from_files

Domain
detected Domain: bugzilla.mozilla.org

XIOC detected Domain: bugzilla.mozilla.org

extracted_from_files

Domain
detected Domain: codereview.chromium.org

XIOC detected Domain: codereview.chromium.org

extracted_from_files

Domain
detected Domain: hasown.call

XIOC detected Domain: hasown.call

extracted_from_files

Domain
detected Domain: expected.name

XIOC detected Domain: expected.name

extracted_from_files

Domain
detected Domain: expected.call

XIOC detected Domain: expected.call

extracted_from_files

Domain
detected Domain: pslice.call

XIOC detected Domain: pslice.call

extracted_from_files

Domain
detected Domain: expected.global

XIOC detected Domain: expected.global

extracted_from_files

Domain
detected Domain: actual.global

XIOC detected Domain: actual.global

extracted_from_files

Domain
detected Domain: assert.fail

XIOC detected Domain: assert.fail

extracted_from_files

Domain
detected Domain: error.prototype.tostring.call

XIOC detected Domain: error.prototype.tostring.call

extracted_from_files

Domain
detected Domain: keys.map

XIOC detected Domain: keys.map

extracted_from_files

Domain
detected Domain: date.prototype.toutcstring.call

XIOC detected Domain: date.prototype.toutcstring.call

extracted_from_files

Domain
detected Domain: date.prototype.tostring.call

XIOC detected Domain: date.prototype.tostring.call

extracted_from_files

Domain
detected Domain: regexp.prototype.tostring.call

XIOC detected Domain: regexp.prototype.tostring.call

extracted_from_files

Domain
detected Domain: value.name

XIOC detected Domain: value.name

extracted_from_files

Domain
detected Domain: process.pid

XIOC detected Domain: process.pid

extracted_from_files

Domain
detected Domain: lodash.bar

XIOC detected Domain: lodash.bar

extracted_from_files

Domain
detected Domain: lodash.foo

XIOC detected Domain: lodash.foo

extracted_from_files

Domain
detected Domain: iterator.next

XIOC detected Domain: iterator.next

extracted_from_files

Domain
detected Domain: func.call

XIOC detected Domain: func.call

extracted_from_files

Domain
detected Domain: handler.call

XIOC detected Domain: handler.call

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: err.name

XIOC detected Domain: err.name

extracted_from_files

Domain
detected Domain: splice.call

XIOC detected Domain: splice.call

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: wrapped.map

XIOC detected Domain: wrapped.map

extracted_from_files

Domain
detected Domain: root.date.now

XIOC detected Domain: root.date.now

extracted_from_files

Domain
detected Domain: functostring.call

XIOC detected Domain: functostring.call

extracted_from_files

Domain
detected Domain: corejsdata.keys.ie

XIOC detected Domain: corejsdata.keys.ie

extracted_from_files

Domain
detected Domain: context.date

XIOC detected Domain: context.date

extracted_from_files

Domain
detected Domain: data.map

XIOC detected Domain: data.map

extracted_from_files

Domain
detected Domain: data.name

XIOC detected Domain: data.name

extracted_from_files

Domain
detected Domain: func.name

XIOC detected Domain: func.name

extracted_from_files

Domain
detected Domain: other.name

XIOC detected Domain: other.name

extracted_from_files

Domain
detected Domain: object.name

XIOC detected Domain: object.name

extracted_from_files

Domain
detected Domain: symbolvalueof.call

XIOC detected Domain: symbolvalueof.call

extracted_from_files

Domain
detected Domain: symboltostring.call

XIOC detected Domain: symboltostring.call

extracted_from_files

Domain
detected Domain: shape.call

XIOC detected Domain: shape.call

extracted_from_files

Domain
detected Domain: predicate.call

XIOC detected Domain: predicate.call

extracted_from_files

Domain
detected Domain: wrapped.next

XIOC detected Domain: wrapped.next

extracted_from_files

Domain
detected Domain: nativereverse.call

XIOC detected Domain: nativereverse.call

extracted_from_files

Domain
detected Domain: nativejoin.call

XIOC detected Domain: nativejoin.call

extracted_from_files

Domain
detected Domain: propertyisenumerable.call

XIOC detected Domain: propertyisenumerable.call

extracted_from_files

Domain
detected Domain: nativeobjecttostring.call

XIOC detected Domain: nativeobjecttostring.call

extracted_from_files

Domain
detected Domain: voorbeeld.nl

XIOC detected Domain: voorbeeld.nl

extracted_from_files

Domain
detected Domain: lodash.map

XIOC detected Domain: lodash.map

extracted_from_files

Domain
detected Domain: view.click

XIOC detected Domain: view.click

extracted_from_files

Domain
detected Domain: separator.global

XIOC detected Domain: separator.global

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: value.call

XIOC detected Domain: value.call

extracted_from_files

Domain
detected Domain: lodashfunc.name

XIOC detected Domain: lodashfunc.name

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: lodash.now

XIOC detected Domain: lodash.now

extracted_from_files

Domain
detected Domain: lodash.lt

XIOC detected Domain: lodash.lt

extracted_from_files

Domain
detected Domain: lodash.gt

XIOC detected Domain: lodash.gt

extracted_from_files

IP
detected Domain: lodash.zip

XIOC detected Domain: lodash.zip

extracted_from_files

Domain
detected Domain: lodash.rest

XIOC detected Domain: lodash.rest

extracted_from_files

Domain
detected Domain: startswith.call

XIOC detected Domain: startswith.call

extracted_from_files

Domain
detected Domain: this.input.search

XIOC detected Domain: this.input.search

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: state.tab

XIOC detected Domain: state.tab

extracted_from_files

Domain
detected Domain: process.off

XIOC detected Domain: process.off

extracted_from_files

Domain
detected Domain: lodash.prototype.at

XIOC detected Domain: lodash.prototype.at

extracted_from_files

URL
detected URL: https://mdn.io/round#Examples)

XIOC detected URL: https://mdn.io/round#Examples)

extracted_from_files

Domain
detected Domain: this.tab

XIOC detected Domain: this.tab

extracted_from_files

Domain
detected Domain: this.option.es

XIOC detected Domain: this.option.es

extracted_from_files

Domain
detected Domain: state.tokens.next

XIOC detected Domain: state.tokens.next

extracted_from_files

Domain
detected Domain: function.call

XIOC detected Domain: function.call

extracted_from_files

Domain
detected Domain: person.name

XIOC detected Domain: person.name

extracted_from_files

Domain
detected Domain: exports.info

XIOC detected Domain: exports.info

extracted_from_files

Domain
detected Domain: state.tokens.curr.id

XIOC detected Domain: state.tokens.curr.id

extracted_from_files

Domain
detected Domain: b.space

XIOC detected Domain: b.space

extracted_from_files

Domain
detected Domain: b.sd

XIOC detected Domain: b.sd

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: b.gr

XIOC detected Domain: b.gr

extracted_from_files

Domain
detected Domain: b.ci

XIOC detected Domain: b.ci

extracted_from_files

Domain
detected Domain: b.case

XIOC detected Domain: b.case

extracted_from_files

Domain
detected Domain: nb.sc

XIOC detected Domain: nb.sc

extracted_from_files

Domain
detected Domain: g.pf

XIOC detected Domain: g.pf

extracted_from_files

Domain
detected Domain: g.final

XIOC detected Domain: g.final

extracted_from_files

Domain
detected Domain: g.me

XIOC detected Domain: g.me

extracted_from_files

Domain
detected Domain: g.sc

XIOC detected Domain: g.sc

extracted_from_files

Domain
detected Domain: g.cc

XIOC detected Domain: g.cc

extracted_from_files

Domain
detected Domain: g.pe

XIOC detected Domain: g.pe

extracted_from_files

Domain
detected Domain: g.lc

XIOC detected Domain: g.lc

extracted_from_files

Domain
detected Domain: g.ps

XIOC detected Domain: g.ps

extracted_from_files

Domain
detected Domain: g.open

XIOC detected Domain: g.open

extracted_from_files

Domain
detected Domain: g.mn

XIOC detected Domain: g.mn

extracted_from_files

Domain
detected Domain: g.sk

XIOC detected Domain: g.sk

extracted_from_files

Domain
detected Domain: g.sm

XIOC detected Domain: g.sm

extracted_from_files

Domain
detected Domain: g.nl

XIOC detected Domain: g.nl

extracted_from_files

Domain
detected Domain: g.cf

XIOC detected Domain: g.cf

extracted_from_files

Domain
detected Domain: g.lu

XIOC detected Domain: g.lu

extracted_from_files

Domain
detected Domain: g.cn

XIOC detected Domain: g.cn

extracted_from_files

Domain
detected Domain: g.lt

XIOC detected Domain: g.lt

extracted_from_files

Domain
detected Domain: g.mc

XIOC detected Domain: g.mc

extracted_from_files

Domain
detected Domain: g.space

XIOC detected Domain: g.space

extracted_from_files

Domain
detected Domain: g.so

XIOC detected Domain: g.so

extracted_from_files

Domain
detected Domain: g.no

XIOC detected Domain: g.no

extracted_from_files

Domain
detected Domain: meta.es

XIOC detected Domain: meta.es

extracted_from_files

Domain
detected Domain: www.jslint.com

XIOC detected Domain: www.jslint.com

extracted_from_files

Domain
detected Domain: s.shaw

XIOC detected Domain: s.shaw

extracted_from_files

Domain
detected Domain: s.new

XIOC detected Domain: s.new

extracted_from_files

Domain
detected Domain: s.java

XIOC detected Domain: s.java

extracted_from_files

Domain
detected Domain: s.guru

XIOC detected Domain: s.guru

extracted_from_files

Domain
detected Domain: s.arab

XIOC detected Domain: s.arab

extracted_from_files

Domain
detected Domain: curr.id

XIOC detected Domain: curr.id

extracted_from_files

Domain
detected Domain: next.id

XIOC detected Domain: next.id

extracted_from_files

Domain
detected Domain: state.tokens.next.id

XIOC detected Domain: state.tokens.next.id

extracted_from_files

Domain
detected Domain: relatedtoken.id

XIOC detected Domain: relatedtoken.id

extracted_from_files

Domain
detected Domain: nexttoken.id

XIOC detected Domain: nexttoken.id

extracted_from_files

Domain
detected Domain: messages.info

XIOC detected Domain: messages.info

extracted_from_files

Domain
detected Domain: token.id

XIOC detected Domain: token.id

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: stmt.id

XIOC detected Domain: stmt.id

extracted_from_files

Domain
detected Domain: that.id

XIOC detected Domain: that.id

extracted_from_files

Domain
detected Domain: typeofvalues.es

XIOC detected Domain: typeofvalues.es

extracted_from_files

Domain
detected Domain: right.id

XIOC detected Domain: right.id

extracted_from_files

Domain
detected Domain: left.id

XIOC detected Domain: left.id

extracted_from_files

Domain
detected Domain: opts.property

XIOC detected Domain: opts.property

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: new.target

XIOC detected Domain: new.target

extracted_from_files

Domain
detected Domain: this.right.id

XIOC detected Domain: this.right.id

extracted_from_files

Domain
detected Domain: that.right.id

XIOC detected Domain: that.right.id

extracted_from_files

Domain
detected Domain: supernud.call

XIOC detected Domain: supernud.call

extracted_from_files

Domain
detected Domain: p.id

XIOC detected Domain: p.id

extracted_from_files

Domain
detected Domain: r.left.id

XIOC detected Domain: r.left.id

extracted_from_files

Domain
detected Domain: options.name

XIOC detected Domain: options.name

extracted_from_files

Domain
detected Domain: ret.left.id

XIOC detected Domain: ret.left.id

extracted_from_files

Domain
detected Domain: preceeding.id

XIOC detected Domain: preceeding.id

extracted_from_files

Domain
detected Domain: state.tokens.prev.id

XIOC detected Domain: state.tokens.prev.id

extracted_from_files

Domain
detected Domain: first.id

XIOC detected Domain: first.id

extracted_from_files

Domain
detected Domain: ret.id

XIOC detected Domain: ret.id

extracted_from_files

Domain
detected Domain: led.call

XIOC detected Domain: led.call

extracted_from_files

Domain
detected Domain: ev.data

XIOC detected Domain: ev.data

extracted_from_files

Domain
detected Domain: pn.id

XIOC detected Domain: pn.id

extracted_from_files

Domain
detected Domain: token.name

XIOC detected Domain: token.name

extracted_from_files

Domain
detected Domain: nud.call

XIOC detected Domain: nud.call

extracted_from_files

Domain
detected Domain: mozyield.call

XIOC detected Domain: mozyield.call

extracted_from_files

Domain
detected Domain: afterparens.id

XIOC detected Domain: afterparens.id

extracted_from_files

Domain
detected Domain: afternext.id

XIOC detected Domain: afternext.id

extracted_from_files

Domain
detected Domain: reset-overlay.show

XIOC detected Domain: reset-overlay.show

extracted_from_files

Domain
detected Domain: formspree.io

XIOC detected Domain: formspree.io

extracted_from_files

Domain
detected Domain: 127988398828-urc6j9p9pvljehmtgsa1u01qikmc797q.apps.googleusercontent.com

XIOC detected Domain: 127988398828-urc6j9p9pvljehmtgsa1u01qikmc797q.apps.googleusercontent.com

extracted_from_files

Domain
detected Domain: specificmatches.map

XIOC detected Domain: specificmatches.map

extracted_from_files

Domain
detected Domain: fu.name

XIOC detected Domain: fu.name

extracted_from_files

Domain
detected Domain: itself.data

XIOC detected Domain: itself.data

extracted_from_files

Domain
detected Domain: data.data

XIOC detected Domain: data.data

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: backupfileinput.click

XIOC detected Domain: backupfileinput.click

extracted_from_files

Domain
detected Domain: btn.dataset.tab

XIOC detected Domain: btn.dataset.tab

extracted_from_files

Domain
detected Domain: this.currenttab.id

XIOC detected Domain: this.currenttab.id

extracted_from_files

Domain
detected Domain: chromewebstore.google.com

XIOC detected Domain: chromewebstore.google.com

extracted_from_files

Domain
detected Domain: email.com

XIOC detected Domain: email.com

extracted_from_files

Domain
detected Domain: splash-screen.show

XIOC detected Domain: splash-screen.show

extracted_from_files

Domain
detected Domain: input.select

XIOC detected Domain: input.select

extracted_from_files

Domain
detected Domain: marketplacetab.click

XIOC detected Domain: marketplacetab.click

extracted_from_files

Domain
detected Domain: e.target.id

XIOC detected Domain: e.target.id

extracted_from_files

Domain
detected Domain: cmd.id

XIOC detected Domain: cmd.id

extracted_from_files

Domain
detected Domain: commands.map

XIOC detected Domain: commands.map

extracted_from_files

IP
detected Domain: matchingscripts.map

XIOC detected Domain: matchingscripts.map

extracted_from_files

Domain
detected Domain: file.name

XIOC detected Domain: file.name

extracted_from_files

Domain
detected Domain: lang.name

XIOC detected Domain: lang.name

extracted_from_files

Domain
detected Domain: languages.map

XIOC detected Domain: languages.map

extracted_from_files

Domain
detected Domain: filedata.id

XIOC detected Domain: filedata.id

extracted_from_files

Domain
detected Domain: this.googleauth.userinfo.email

XIOC detected Domain: this.googleauth.userinfo.email

extracted_from_files

Domain
detected Domain: exceptionlist.map

XIOC detected Domain: exceptionlist.map

extracted_from_files

Domain
detected Domain: link.click

XIOC detected Domain: link.click

extracted_from_files

Domain
detected Domain: link.download

XIOC detected Domain: link.download

extracted_from_files

Domain
detected Domain: settingstab.click

XIOC detected Domain: settingstab.click

extracted_from_files

IP
detected Domain: tooltip.style.top

XIOC detected Domain: tooltip.style.top

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: spotlight.style.top

XIOC detected Domain: spotlight.style.top

extracted_from_files

Domain
detected Domain: containerrect.top

XIOC detected Domain: containerrect.top

extracted_from_files

Domain
detected Domain: targetrect.top

XIOC detected Domain: targetrect.top

extracted_from_files

Domain
detected Domain: step.target

XIOC detected Domain: step.target

extracted_from_files

URL
detected URL: https://*.udaharan.com/*

XIOC detected URL: https://*.udaharan.com/*

extracted_from_files

URL
detected URL: https://*.exemple.com/*

XIOC detected URL: https://*.exemple.com/*

extracted_from_files

URL
detected URL: https://*.mesal.ir/*

XIOC detected URL: https://*.mesal.ir/*

extracted_from_files

URL
detected URL: https://*.ejemplo.com/*

XIOC detected URL: https://*.ejemplo.com/*

extracted_from_files

URL
detected URL: https://*.beispiel.de/*

XIOC detected URL: https://*.beispiel.de/*

extracted_from_files

URL
detected URL: https://*.example.com/*

XIOC detected URL: https://*.example.com/*

extracted_from_files

Domain
detected Domain: googleloginbtn.click

XIOC detected Domain: googleloginbtn.click

extracted_from_files

URL
detected URL: https://*.ornek.com/*

XIOC detected URL: https://*.ornek.com/*

extracted_from_files

URL
detected URL: https://*.exemplo.com/*

XIOC detected URL: https://*.exemplo.com/*

extracted_from_files

URL
detected URL: https://*.przyklad.pl/*

XIOC detected URL: https://*.przyklad.pl/*

extracted_from_files

URL
detected URL: https://*.voorbeeld.nl/*

XIOC detected URL: https://*.voorbeeld.nl/*

extracted_from_files

URL
detected URL: https://*.conto.jv/*

XIOC detected URL: https://*.conto.jv/*

extracted_from_files

URL
detected URL: https://*.esempio.it/*

XIOC detected URL: https://*.esempio.it/*

extracted_from_files

URL
detected URL: https://*.contoh.com/*

XIOC detected URL: https://*.contoh.com/*

extracted_from_files

URL
detected URL: https://update.greasyfork.org/scripts/$

XIOC detected URL: https://update.greasyfork.org/scripts/$

extracted_from_files

URL
detected URL: https://www.google.com/s2/favicons?sz=64&domain=example.com

XIOC detected URL: https://www.google.com/s2/favicons?sz=64&domain=example.com

extracted_from_files

URL
detected URL: http://tampermonkey.net/

XIOC detected URL: http://tampermonkey.net/

extracted_from_files

URL
detected URL: https://react.dev/errors/

XIOC detected URL: https://react.dev/errors/

extracted_from_files

URL
detected URL: https://www.googleapis.com/oauth2/v2/userinfo',

XIOC detected URL: https://www.googleapis.com/oauth2/v2/userinfo',

extracted_from_files

URL
detected URL: https://*.misaal.pk/*

XIOC detected URL: https://*.misaal.pk/*

extracted_from_files

URL
detected URL: https://lodash.com/

XIOC detected URL: https://lodash.com/

extracted_from_files

URL
detected URL: http://msdn.microsoft.com/en-us/library/ie/dww52sbt(v=vs.94).aspx

XIOC detected URL: http://msdn.microsoft.com/en-us/library/ie/dww52sbt(v=vs.94).aspx

extracted_from_files

URL
detected URL: http://en.wikipedia.org/wiki/ANSI_escape_code#graphics

XIOC detected URL: http://en.wikipedia.org/wiki/ANSI_escape_code#graphics

extracted_from_files

URL
detected URL: http://narwhaljs.org)

XIOC detected URL: http://narwhaljs.org)

extracted_from_files

URL
detected URL: http://wiki.commonjs.org/wiki/Unit_Testing/1.0

XIOC detected URL: http://wiki.commonjs.org/wiki/Unit_Testing/1.0

extracted_from_files

URL
detected URL: https://www.adobe.com/misc/pki/prod_svce_cps.html0$

XIOC detected URL: https://www.adobe.com/misc/pki/prod_svce_cps.html0$

extracted_from_files

URL
detected URL: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07

XIOC detected URL: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks)

XIOC detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks)

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-template-literal-lexical-components).

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-template-literal-lexical-components).

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-patterns).

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-patterns).

extracted_from_files

URL
detected URL: https://npms.io/search?q=ponyfill.',

XIOC detected URL: https://npms.io/search?q=ponyfill.',

extracted_from_files

URL
detected URL: http://underscorejs.org/LICENSE

XIOC detected URL: http://underscorejs.org/LICENSE

extracted_from_files

URL
detected URL: https://lodash.com/license

XIOC detected URL: https://lodash.com/license

extracted_from_files

URL
detected URL: https://openjsf.org/

XIOC detected URL: https://openjsf.org/

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Exponentiation_by_squaring

XIOC detected URL: https://en.wikipedia.org/wiki/Exponentiation_by_squaring

extracted_from_files

URL
detected URL: https://bugs.webkit.org/show_bug.cgi?id=156034

XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=156034

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-samevaluezero)

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-samevaluezero)

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-object.prototype.tostring)

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-object.prototype.tostring)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks_for_Symbols).

XIOC detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks_for_Symbols).

extracted_from_files

Domain
detected Domain: lodash.at

XIOC detected Domain: lodash.at

extracted_from_files

Domain
detected Domain: esempio.it

XIOC detected Domain: esempio.it

extracted_from_files

URL
detected URL: https://es5.github.io/#x13.2.2

XIOC detected URL: https://es5.github.io/#x13.2.2

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-ecmascript-function-objects-call-thisargument-argumentslist

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-ecmascript-function-objects-call-thisargument-argumentslist

extracted_from_files

URL
detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=90

XIOC detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=90

extracted_from_files

URL
detected URL: https://github.com/jashkenas/underscore/pull/1247

XIOC detected URL: https://github.com/jashkenas/underscore/pull/1247

extracted_from_files

URL
detected URL: https://mdn.io/clearTimeout).

XIOC detected URL: https://mdn.io/clearTimeout).

extracted_from_files

URL
detected URL: https://mdn.io/iteration_protocols#iterator).

XIOC detected URL: https://mdn.io/iteration_protocols#iterator).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Symmetric_difference)

XIOC detected URL: https://en.wikipedia.org/wiki/Symmetric_difference)

extracted_from_files

URL
detected URL: https://mdn.io/Array/slice)

XIOC detected URL: https://mdn.io/Array/slice)

extracted_from_files

URL
detected URL: https://mdn.io/Array/reverse).

XIOC detected URL: https://mdn.io/Array/reverse).

extracted_from_files

URL
detected URL: https://mdn.io/setTimeout).

XIOC detected URL: https://mdn.io/setTimeout).

extracted_from_files

URL
detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=2070)

XIOC detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=2070)

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-object.keys)

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-object.keys)

extracted_from_files

URL
detected URL: https://mdn.io/rest_parameters).

XIOC detected URL: https://mdn.io/rest_parameters).

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-properties-of-the-map-prototype-object)

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-properties-of-the-map-prototype-object)

extracted_from_files

URL
detected URL: https://css-tricks.com/debouncing-throttling-explained-examples/)

XIOC detected URL: https://css-tricks.com/debouncing-throttling-explained-examples/)

extracted_from_files

URL
detected URL: http://peter.michaux.ca/articles/lazy-function-definition-pattern)

XIOC detected URL: http://peter.michaux.ca/articles/lazy-function-definition-pattern)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Fisher-Yates_shuffle).

XIOC detected URL: https://en.wikipedia.org/wiki/Fisher-Yates_shuffle).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Vacuous_truth)

XIOC detected URL: https://en.wikipedia.org/wiki/Vacuous_truth)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Empty_set)

XIOC detected URL: https://en.wikipedia.org/wiki/Empty_set)

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-ecmascript-language-types)

XIOC detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-ecmascript-language-types)

extracted_from_files

URL
detected URL: http://ecma-international.org/ecma-262/7.0/#sec-tolength).

XIOC detected URL: http://ecma-international.org/ecma-262/7.0/#sec-tolength).

extracted_from_files

URL
detected URL: https://mdn.io/Number/isInteger).

XIOC detected URL: https://mdn.io/Number/isInteger).

extracted_from_files

URL
detected URL: https://mdn.io/Number/isFinite).

XIOC detected URL: https://mdn.io/Number/isFinite).

extracted_from_files

URL
detected URL: https://mdn.io/Structured_clone_algorithm)

XIOC detected URL: https://mdn.io/Structured_clone_algorithm)

extracted_from_files

URL
detected URL: https://mdn.io/spread_operator).

XIOC detected URL: https://mdn.io/spread_operator).

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-function.prototype.apply).

XIOC detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-function.prototype.apply).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/CamelCase).

XIOC detected URL: https://en.wikipedia.org/wiki/CamelCase).

extracted_from_files

URL
detected URL: https://mdn.io/Object/assign).

XIOC detected URL: https://mdn.io/Object/assign).

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-tointeger).

XIOC detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-tointeger).

extracted_from_files

URL
detected URL: https://mdn.io/Number/isSafeInteger).

XIOC detected URL: https://mdn.io/Number/isSafeInteger).

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/babel-polyfill),

XIOC detected URL: https://www.npmjs.com/package/babel-polyfill),

extracted_from_files

URL
detected URL: https://mdn.io/isNaN)

XIOC detected URL: https://mdn.io/isNaN)

extracted_from_files

URL
detected URL: https://mdn.io/Number/isNaN)

XIOC detected URL: https://mdn.io/Number/isNaN)

extracted_from_files

URL
detected URL: https://lodash.com/)');

XIOC detected URL: https://lodash.com/)');

extracted_from_files

URL
detected URL: http://wonko.com/post/html-escaping)

XIOC detected URL: http://wonko.com/post/html-escaping)

extracted_from_files

URL
detected URL: https://mathiasbynens.be/notes/ambiguous-ampersands)

XIOC detected URL: https://mathiasbynens.be/notes/ambiguous-ampersands)

extracted_from_files

URL
detected URL: https://mths.be/he).

XIOC detected URL: https://mths.be/he).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks).

XIOC detected URL: https://en.wikipedia.org/wiki/Combining_Diacritical_Marks).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Latin_Extended-A)

XIOC detected URL: https://en.wikipedia.org/wiki/Latin_Extended-A)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Latin-1_Supplement_(Unicode_block)#Character_table)

XIOC detected URL: https://en.wikipedia.org/wiki/Latin-1_Supplement_(Unicode_block)#Character_table)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Letter_case#Stylistic_or_specialised_usage).

XIOC detected URL: https://en.wikipedia.org/wiki/Letter_case#Stylistic_or_specialised_usage).

extracted_from_files

URL
detected URL: https://mdn.io/String/split).

XIOC detected URL: https://mdn.io/String/split).

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Snake_case).

XIOC detected URL: https://en.wikipedia.org/wiki/Snake_case).

extracted_from_files

URL
detected URL: https://mdn.io/String/replace).

XIOC detected URL: https://mdn.io/String/replace).

extracted_from_files

URL
detected URL: https://es5.github.io/#x15.1.2.2)

XIOC detected URL: https://es5.github.io/#x15.1.2.2)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Letter_case#Special_case_styles).

XIOC detected URL: https://en.wikipedia.org/wiki/Letter_case#Special_case_styles).

extracted_from_files

URL
detected URL: https://lodash

XIOC detected URL: https://lodash

extracted_from_files

URL
detected URL: https://mdn.io/toUpperCase).

XIOC detected URL: https://mdn.io/toUpperCase).

extracted_from_files

URL
detected URL: https://mdn.io/toLowerCase).

XIOC detected URL: https://mdn.io/toLowerCase).

extracted_from_files

URL
detected URL: https://github.com/olado/doT).

XIOC detected URL: https://github.com/olado/doT).

extracted_from_files

URL
detected URL: http://ejohn.org/blog/javascript-micro-templating/)

XIOC detected URL: http://ejohn.org/blog/javascript-micro-templating/)

extracted_from_files

URL
detected URL: https://developer.chrome.com/extensions/sandboxingEval).

XIOC detected URL: https://developer.chrome.com/extensions/sandboxingEval).

extracted_from_files

URL
detected URL: https://lodash.com/custom-builds).

XIOC detected URL: https://lodash.com/custom-builds).

extracted_from_files

URL
detected URL: http://www.html5rocks.com/en/tutorials/developertools/sourcemaps/#toc-sourceurl)

XIOC detected URL: http://www.html5rocks.com/en/tutorials/developertools/sourcemaps/#toc-sourceurl)

extracted_from_files

URL
detected URL: http://es5.github.io/).

XIOC detected URL: http://es5.github.io/).

extracted_from_files

URL
detected URL: http://javascriptweblog.wordpress.com/2011/02/07/truth-equality-and-javascript/)

XIOC detected URL: http://javascriptweblog.wordpress.com/2011/02/07/truth-equality-and-javascript/)

extracted_from_files

URL
detected URL: https://github.com/jscs-dev/node-jscs).

XIOC detected URL: https://github.com/jscs-dev/node-jscs).

extracted_from_files

URL
detected URL: https://bocoup.com/blog/whats-in-a-function-name

XIOC detected URL: https://bocoup.com/blog/whats-in-a-function-name

extracted_from_files

URL
detected URL: http://jshint.com/docs/options/#nonbsp

XIOC detected URL: http://jshint.com/docs/options/#nonbsp

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/SpiderMonkey/Parser_API

XIOC detected URL: https://developer.mozilla.org/en-US/docs/SpiderMonkey/Parser_API

extracted_from_files

URL
detected URL: http://requirejs.org/docs/errors.html#mismatch

XIOC detected URL: http://requirejs.org/docs/errors.html#mismatch

extracted_from_files

URL
detected URL: http://inimino.org/~inimino/blog/javascript_semicolons).

XIOC detected URL: http://inimino.org/~inimino/blog/javascript_semicolons).

extracted_from_files

URL
detected URL: http://blog.izs.me/post/2353458699/an-open-letter-to-javascript-leaders-regarding)

XIOC detected URL: http://blog.izs.me/post/2353458699/an-open-letter-to-javascript-leaders-regarding)

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-7.9.2)

XIOC detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-7.9.2)

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-11.1.5).)

XIOC detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-11.1.5).)

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-11.1.4)

XIOC detected URL: http://www.ecma-international.org/ecma-262/5.1/#sec-11.1.4)

extracted_from_files

URL
detected URL: https://jakearchibald.com/2017/await-vs-return-vs-return-await/

XIOC detected URL: https://jakearchibald.com/2017/await-vs-return-vs-return-await/

extracted_from_files

URL
detected URL: http://javascriptweblog.wordpress.com/2011/01/04/exploring-javascript-for-in-loops/)

XIOC detected URL: http://javascriptweblog.wordpress.com/2011/01/04/exploring-javascript-for-in-loops/)

extracted_from_files

URL
detected URL: https://jasmine.github.io/).

XIOC detected URL: https://jasmine.github.io/).

extracted_from_files

URL
detected URL: http://couchdb.apache.org/).

XIOC detected URL: http://couchdb.apache.org/).

extracted_from_files

URL
detected URL: http://mootools.net/)

XIOC detected URL: http://mootools.net/)

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/6.0/index.html)

XIOC detected URL: http://www.ecma-international.org/ecma-262/6.0/index.html)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/JavaScript/New_in_JavaScript/1.7)

XIOC detected URL: https://developer.mozilla.org/en-US/docs/JavaScript/New_in_JavaScript/1.7)

extracted_from_files

URL
detected URL: http://yuiblog.com/blog/2006/04/11/with-statement-considered-harmful/)

XIOC detected URL: http://yuiblog.com/blog/2006/04/11/with-statement-considered-harmful/)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/typeof).

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/typeof).

extracted_from_files

URL
detected URL: http://yuilibrary.com/)

XIOC detected URL: http://yuilibrary.com/)

extracted_from_files

URL
detected URL: http://www.prototypejs.org/)

XIOC detected URL: http://www.prototypejs.org/)

extracted_from_files

URL
detected URL: http://documentup.com/arturadib/shelljs).

XIOC detected URL: http://documentup.com/arturadib/shelljs).

extracted_from_files

URL
detected URL: http://www.mozilla.org/rhino/)

XIOC detected URL: http://www.mozilla.org/rhino/)

extracted_from_files

URL
detected URL: http://qunitjs.com/).

XIOC detected URL: http://qunitjs.com/).

extracted_from_files

URL
detected URL: http://nodejs.org/)

XIOC detected URL: http://nodejs.org/)

extracted_from_files

URL
detected URL: http://jquery.com/)

XIOC detected URL: http://jquery.com/)

extracted_from_files

URL
detected URL: http://phantomjs.org/)

XIOC detected URL: http://phantomjs.org/)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Typed_arrays)

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Typed_arrays)

extracted_from_files

URL
detected URL: http://dojotoolkit.org/).

XIOC detected URL: http://dojotoolkit.org/).

extracted_from_files

URL
detected URL: http://browserify.org/)

XIOC detected URL: http://browserify.org/)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en/Using_web_workers)

XIOC detected URL: https://developer.mozilla.org/en/Using_web_workers)

extracted_from_files

URL
detected URL: http://en.wikipedia.org/wiki/Windows_Script_Host).

XIOC detected URL: http://en.wikipedia.org/wiki/Windows_Script_Host).

extracted_from_files

URL
detected URL: http://mochajs.org/).

XIOC detected URL: http://mochajs.org/).

extracted_from_files

URL
detected URL: https://www.ecma-international.org/ecma-262/8.0/index.html).

XIOC detected URL: https://www.ecma-international.org/ecma-262/8.0/index.html).

extracted_from_files

URL
detected URL: https://www.ecma-international.org/ecma-262/7.0/index.html).

XIOC detected URL: https://www.ecma-international.org/ecma-262/7.0/index.html).

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/5.1/index.html).

XIOC detected URL: http://www.ecma-international.org/ecma-262/5.1/index.html).

extracted_from_files

URL
detected URL: http://www.adequatelygood.com/2010/2/JavaScript-Scoping-and-Hoisting)

XIOC detected URL: http://www.adequatelygood.com/2010/2/JavaScript-Scoping-and-Hoisting)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en/JavaScript/Strict_mode)

XIOC detected URL: https://developer.mozilla.org/en/JavaScript/Strict_mode)

extracted_from_files

URL
detected URL: http://en.wikipedia.org/wiki/Cyclomatic_complexity).

XIOC detected URL: http://en.wikipedia.org/wiki/Cyclomatic_complexity).

extracted_from_files

URL
detected URL: http://jshint.com/docs/#inline-configuration).

XIOC detected URL: http://jshint.com/docs/#inline-configuration).

extracted_from_files

URL
detected URL: https://codereview.chromium.org/96653004/

XIOC detected URL: https://codereview.chromium.org/96653004/

extracted_from_files

URL
detected URL: https://github.com/whatwg/html/pull/1095.

XIOC detected URL: https://github.com/whatwg/html/pull/1095.

extracted_from_files

URL
detected URL: https://github.com/jshint/jshint/issues/2400

XIOC detected URL: https://github.com/jshint/jshint/issues/2400

extracted_from_files

URL
detected URL: https://github.com/jshint/jshint/issues/2409

XIOC detected URL: https://github.com/jshint/jshint/issues/2409

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/RegExp

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/RegExp

extracted_from_files

URL
detected URL: https://www.ecma-international.org/ecma-262/10.0/index.html).

XIOC detected URL: https://www.ecma-international.org/ecma-262/10.0/index.html).

extracted_from_files

URL
detected URL: https://www.ecma-international.org/ecma-262/9.0/index.html).

XIOC detected URL: https://www.ecma-international.org/ecma-262/9.0/index.html).

extracted_from_files

URL
detected URL: http://json.org/

XIOC detected URL: http://json.org/

extracted_from_files

URL
detected URL: https://github.com/jshint/jshint/pull/2144#discussion_r23978406

XIOC detected URL: https://github.com/jshint/jshint/pull/2144#discussion_r23978406

extracted_from_files

URL
detected URL: http://robertnyman.com/2005/12/21/what-is-typeof-unknown/

XIOC detected URL: http://robertnyman.com/2005/12/21/what-is-typeof-unknown/

extracted_from_files

URL
detected URL: http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-357.pdf

XIOC detected URL: http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-357.pdf

extracted_from_files

URL
detected URL: https://github.com/jshint/jshint/pull/3222.

XIOC detected URL: https://github.com/jshint/jshint/pull/3222.

extracted_from_files

URL
detected URL: https://bugs.webkit.org/show_bug.cgi?id=7139.

XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=7139.

extracted_from_files

URL
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=1266495

XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=1266495

extracted_from_files

URL
detected URL: https://greasyfork.org/en/scripts

XIOC detected URL: https://greasyfork.org/en/scripts

extracted_from_files

URL
detected URL: https://openuserjs.org$

XIOC detected URL: https://openuserjs.org$

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/drive.file

XIOC detected URL: https://www.googleapis.com/auth/drive.file

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://example.com

XIOC detected URL: https://example.com

extracted_from_files

URL
detected URL: https://').replace(/

XIOC detected URL: https://').replace(/

extracted_from_files

URL
detected URL: https://www.google.com/s2/favicons?domain=$

XIOC detected URL: https://www.google.com/s2/favicons?domain=$

extracted_from_files

URL
detected URL: https://ko-fi.com/favicon.ico

XIOC detected URL: https://ko-fi.com/favicon.ico

extracted_from_files

URL
detected URL: https://formspree.io/f/mdalwvqn

XIOC detected URL: https://formspree.io/f/mdalwvqn

extracted_from_files

URL
detected URL: https://github.com/search?q=userscript&type=repositories

XIOC detected URL: https://github.com/search?q=userscript&type=repositories

extracted_from_files

URL
detected URL: https://github.com/awesome-scripts/awesome-userscripts

XIOC detected URL: https://github.com/awesome-scripts/awesome-userscripts

extracted_from_files

URL
detected URL: https://userscript.zone/

XIOC detected URL: https://userscript.zone/

extracted_from_files

URL
detected URL: https://openuserjs.org/

XIOC detected URL: https://openuserjs.org/

extracted_from_files

URL
detected URL: https://www.googleapis.com/drive/v3/files?q=name='userscripts-backup.json'

XIOC detected URL: https://www.googleapis.com/drive/v3/files?q=name='userscripts-backup.json'

extracted_from_files

URL
detected URL: https://www.googleapis.com/upload/drive/v3/files/$

XIOC detected URL: https://www.googleapis.com/upload/drive/v3/files/$

extracted_from_files

URL
detected URL: https://www.googleapis.com/drive/v3/files/$

XIOC detected URL: https://www.googleapis.com/drive/v3/files/$

extracted_from_files

URL
detected URL: https://example.com)',

XIOC detected URL: https://example.com)',

extracted_from_files

URL
detected URL: https://chromewebstore.google.com/detail/aopmgjdppgdhejibmejbahdkhpklkdjf?utm_source=item-share-cb'

XIOC detected URL: https://chromewebstore.google.com/detail/aopmgjdppgdhejibmejbahdkhpklkdjf?utm_source=item-share-cb'

extracted_from_files

URL
detected URL: https://ko-fi.com/sudosoft'

XIOC detected URL: https://ko-fi.com/sudosoft'

extracted_from_files

URL
detected URL: https://www.googleapis.com/upload/drive/v3/files?uploadType=multipart',

XIOC detected URL: https://www.googleapis.com/upload/drive/v3/files?uploadType=multipart',

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

URL
detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-regexp.prototype.tostring

XIOC detected URL: http://www.ecma-international.org/ecma-262/7.0/#sec-regexp.prototype.tostring

extracted_from_files

Domain
detected Domain: przyklad.pl

XIOC detected Domain: przyklad.pl

extracted_from_files

IP
detected IP: 15.1.2.2

XIOC detected IP: 15.1.2.2

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected Domain: userscript.zone

XIOC detected Domain: userscript.zone

extracted_from_files

Domain
detected Domain: beispiel.de

XIOC detected Domain: beispiel.de

extracted_from_files

Domain
detected Domain: ejemplo.com

XIOC detected Domain: ejemplo.com

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: d4::

XIOC detected IP: d4::

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

IP
detected IP: ::b

XIOC detected IP: ::b

extracted_from_files

IP
detected IP: ::d

XIOC detected IP: ::d

extracted_from_files

URL
detected URL: http://eev.ee/blog/2015/09/12/dark-corners-of-unicode/).

XIOC detected URL: http://eev.ee/blog/2015/09/12/dark-corners-of-unicode/).

extracted_from_files

URL
detected URL: https://mathiasbynens.be/notes/javascript-unicode).

XIOC detected URL: https://mathiasbynens.be/notes/javascript-unicode).

extracted_from_files

Domain
detected Domain: contoh.com

XIOC detected Domain: contoh.com

extracted_from_files

Domain
detected Domain: lodash.property

XIOC detected Domain: lodash.property

extracted_from_files

Security Analysis Summary

Security Analysis Overview

GreasePanda is a Chrome Web Store extension published by [email protected]. Version 2.2.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 817 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 3 finding(s)
  • Medium: 641 finding(s)
  • Low: 173 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

GreasePanda is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 1K users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions