You can read more details about this proof of concept on the introductory blog post:
A usable proof-of-concept for a browser extension that checks if a malicious site is trying to impersonate a valid one.
Its main features are:
- Local database: there is no central database, all information is kept in the user’s browser.
- Work with what the user sees: Hominoid flags malicious sites that look similar to the real ones, regardless of their code.
- Private sites: as all computations are done in the user’s browser, there is no difference between public and private sites. All of them can be analyzed accordingly.
- Better control: as the plugin resides in the user’s browser, it can be configured to analyze only pages with certain characteristics. For example a login form, a credit card field, etc.
Run the following commands to install dependencies and start developing
yarn install
yarn dev
Loading the extension in Google Chrome
In Google Chrome, open up chrome://extensions in a new tab. Make sure the Developer Mode
checkbox in the upper-right corner is turned on. Click Load unpacked
and select the dist
directory in this repository - your extension should now be loaded.
Loading the extension in Brave
In Brave, open up brave://extensions in a new tab. Make sure the Developer Mode
checkbox in the upper-right corner is turned on. Click Load unpacked
and select the dist
directory in this repository - your extension should now be loaded.
Loading the extension in Mozilla Firefox
In Mozilla Firefox, open up the about:debugging page in a new tab. Click the Load Temporary Add-on...
button and select the manfiest.json
from the dist
directory in this repository - your extension should now be loaded.