Is "Ninja Hacker Cat" on Firefox Add-ons Safe to Install?
This extension will make simple security requests for you. It can check the website you are visiting for security issue. You should only use it on your own websites. It can detect versions of the running web application and check if thats a vulnerable version. The detection is based on versions detection or proof of concept requests. Current detections: Simple Cross Site Scripting, SQL Injections and Wordpress-Backups. CVS: Confluence Server (CVE-2022-26134), Bitbucket Server (CVE-2022-36804), Exchange Server Proxyshell (CVE-2021-34473), Apache (CVE-2021-41773), Weblogic Console (CVE-2020-14882). The detections are under development. Current detections are listed in GitHub: https://github.com/Leetcore/ninja-hacker-cat
Risk Assessment
Analyzed98 security findings detected across all analyzers
Firefox extension requesting 3 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
9 rules(32 hits)Requested Permissions
3 permissionsAccess and modify data on every website you visit
Intercept, modify, and block all network requests
About This Extension
Detailed Findings
37 totalYARA Rule Matches
9 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 61
detected Domain: wp-config.php.save XIOC detected Domain: wp-config.php.save
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected URL: https://addons.mozilla.org/de/firefox/addon/ninja-hacker-cat/ XIOC detected URL: https://addons.mozilla.org/de/firefox/addon/ninja-hacker-cat/
extracted_from_files
detected URL: https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2022-26134 XIOC detected URL: https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2022-26134
extracted_from_files
detected URL: https://portswigger.net/support/using-burp-to-test-for-os-command-injection-vulnerabilities) XIOC detected URL: https://portswigger.net/support/using-burp-to-test-for-os-command-injection-vulnerabilities)
extracted_from_files
detected URL: https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py) XIOC detected URL: https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py)
extracted_from_files
detected URL: https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html) XIOC detected URL: https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html)
extracted_from_files
detected URL: https://www.1337core.de XIOC detected URL: https://www.1337core.de
extracted_from_files
detected Domain: t.gr XIOC detected Domain: t.gr
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected URL: https://mozilla.org/MPL/2.0/. XIOC detected URL: https://mozilla.org/MPL/2.0/.
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected URL: https://github.com/Leetcore/ninja-hacker-cat XIOC detected URL: https://github.com/Leetcore/ninja-hacker-cat
extracted_from_files
detected URL: https://github.com/sponsors/Leetcore XIOC detected URL: https://github.com/sponsors/Leetcore
extracted_from_files
detected URL: https://ko-fi.com/leetcore XIOC detected URL: https://ko-fi.com/leetcore
extracted_from_files
detected Domain: backup.zip XIOC detected Domain: backup.zip
extracted_from_files
detected Domain: readme.md XIOC detected Domain: readme.md
extracted_from_files
detected Domain: foo.com XIOC detected Domain: foo.com
extracted_from_files
detected Domain: windowinfo.id XIOC detected Domain: windowinfo.id
extracted_from_files
detected Domain: header.name XIOC detected Domain: header.name
extracted_from_files
detected Domain: s.ph XIOC detected Domain: s.ph
extracted_from_files
detected Domain: ݢ.gd XIOC detected Domain: ݢ.gd
extracted_from_files
detected Domain: ko-fi.com XIOC detected Domain: ko-fi.com
extracted_from_files
detected Domain: www.1337core.de XIOC detected Domain: www.1337core.de
extracted_from_files
detected Domain: portswigger.net XIOC detected Domain: portswigger.net
extracted_from_files
detected Domain: www.synacktiv.com XIOC detected Domain: www.synacktiv.com
extracted_from_files
detected Domain: cve-2022-1388.py XIOC detected Domain: cve-2022-1388.py
extracted_from_files
detected Domain: ninja-hacker-cat.zip XIOC detected Domain: ninja-hacker-cat.zip
extracted_from_files
detected MD5 Hash: edd1c9f034335f136f87ad84b625c8f1 XIOC detected MD5 Hash: edd1c9f034335f136f87ad84b625c8f1
extracted_from_files
detected Domain: z.tv XIOC detected Domain: z.tv
extracted_from_files
detected Domain: 낹.ki XIOC detected Domain: 낹.ki
extracted_from_files
detected Domain: ԥ.sk XIOC detected Domain: ԥ.sk
extracted_from_files
detected Domain: p.td XIOC detected Domain: p.td
extracted_from_files
detected Domain: b.ge XIOC detected Domain: b.ge
extracted_from_files
detected Domain: y.hu XIOC detected Domain: y.hu
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: tc525924ea5d91b1457dcbd826bb64454.4664a6fac6428c9786ab1952b077c1bf.addons.mozilla.org XIOC detected Domain: tc525924ea5d91b1457dcbd826bb64454.4664a6fac6428c9786ab1952b077c1bf.addons.mozilla.org
extracted_from_files
detected Domain: ę6.jm XIOC detected Domain: ę6.jm
extracted_from_files
detected Domain: rule.cat XIOC detected Domain: rule.cat
extracted_from_files
detected Domain: options.data XIOC detected Domain: options.data
extracted_from_files
detected IP: 127.0.0.1 XIOC detected IP: 127.0.0.1
extracted_from_files
detected IP: 5::e XIOC detected IP: 5::e
extracted_from_files
detected Domain: mozilla.org XIOC detected Domain: mozilla.org
extracted_from_files
detected Domain: rubygems.org XIOC detected Domain: rubygems.org
extracted_from_files
detected Domain: miau2.mp XIOC detected Domain: miau2.mp
extracted_from_files
detected Domain: miau1.mp XIOC detected Domain: miau1.mp
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected IP: 1:: XIOC detected IP: 1::
extracted_from_files
detected IP: 2:: XIOC detected IP: 2::
extracted_from_files
detected IP: 0:: XIOC detected IP: 0::
extracted_from_files
detected IP: 4:: XIOC detected IP: 4::
extracted_from_files
detected IP: c:: XIOC detected IP: c::
extracted_from_files
detected IP: ::4 XIOC detected IP: ::4
extracted_from_files
detected IP: ::a XIOC detected IP: ::a
extracted_from_files
detected MD5 Hash: 4664a6fac6428c9786ab1952b077c1bf XIOC detected MD5 Hash: 4664a6fac6428c9786ab1952b077c1bf
extracted_from_files
detected URL: http://www.w3.org/2000/svg XIOC detected URL: http://www.w3.org/2000/svg
extracted_from_files
detected URL: https://rubygems.org XIOC detected URL: https://rubygems.org
extracted_from_files
detected URL: https://www.1337core.de/ XIOC detected URL: https://www.1337core.de/
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Ninja Hacker Cat is a Firefox Add-ons extension published by Alex. Version 1.7 has been analyzed by the Risky Plugins security platform, receiving a risk score of 61.53/100 (MEDIUM risk) based on 98 security findings.
Risk Assessment
This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.
Findings Breakdown
- High: 32 finding(s)
- Medium: 66 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Ninja Hacker Cat is published by Alex on the Firefox Add-ons marketplace. The extension has approximately 52 users.
Recommendation
This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
RoPro - Port from Chrome
alex
Youtube Shorts Blocker
alex
Youtube Shorts Blocker
alex
AlienTab - New Tab
Alex
AVADoma - Domains for IPFS, AVAX Wallet
Alex
AVADoma - Domains for IPFS, AVAX Wallet
Alex