WebExtension.net
WebExtension.net
Toggle dark mode
WebExtension.net
WebExtension.net
ThreatSlayer: Security & Phishing Protection

ThreatSlayer: Security & Phishing Protection

View on Chrome Web Store
View ThreatSlayer: Security & Phishing Protection Chrome Extension on Chrome Web Store
Add to bookmarks
4.9 (191 ratings)
1 new ratings
0 views
This extension has been viewed 0 times

Data is synced from the Chrome Web Store. View the official store page for the most current information.

Free enterprise-grade protection for your personal browser.
Type
Extension
Users
200,000 users
100K
Interlock Network
View author page of Interlock Network
Featured Extension

Hand-picked for quality and usefulness

Published
Published on December 16, 2022
Version 2.5.3
Manifest version
3
Updated
Updated on January 25, 2025
productivity/workflow
Extension Category
View on Chrome Web Store
View ThreatSlayer: Security & Phishing Protection Chrome Extension on Chrome Web Store
Share This Extension
Share on Twitter
Share on Facebook
Share on LinkedIn
Share on Reddit
Share on Bluesky
Share on Pinterest
ThreatSlayer: Security & Phishing Protection Chrome Extension Image 2
ThreatSlayer: Security & Phishing Protection Chrome Extension Image 3
ThreatSlayer: Security & Phishing Protection Chrome Extension Image 4
ThreatSlayer: Security & Phishing Protection Chrome Extension Image 5
ThreatSlayer: Security & Phishing Protection Chrome Extension Image 6

Description

Say hello to ThreatSlayer, your personal browser bodyguard extension.

What is ThreatSlayer? ThreatSlayer is a free, enterprise-grade protection for your personal browser. It uses advanced AI threat detection and a collaborative network of users to block dangerous websites and protect you from phishing attacks, scams, and bad downloads. We believe in rewarding the community for making the internet safer. In the future, you will be able to enable blockchain connection and earn $ILOCK rewards for sharing security data and training our AI when it misclassifies a site.

Key features • Instant protection from browser-based threats: dangerous websites, phishing attacks, and bad downloads • AI Threat Detection recognizes novel URLs and dangerous sites in real-time • Easy one-click installation • Power of the community: future rewards for keeping the community safe and a referral system to keep our movement growing

What makes ThreatSlayer special? Most security products use static databases, so they’re unable to detect attacks in real time. ThreatSlayer is proactive. It doesn’t wait for trouble to find you: it finds trouble first. ThreatSlayer’s AI works by comparing a list of trusted and untrusted websites to a trained system called a classifier. The classifier uses supervised learning to understand the differences between safe and dangerous sites and can accurately identify potential threats in real-time to keep you safe online. Moreover, ThreatSlayer combines the power of the Web3 community and AI to crowdsource security. By leveraging collective input from users, ThreatSlayer continuously improves its threat detection capabilities, making the internet a safer place for everyone.

How much does it cost? ThreatSlayer is open-source and completely free to use. Not only that, but in the future, you will be able to earn rewards for using it!

What data does ThreatSlayer collect? ThreatSlayer collects no personal information. The only data it sends is a URL, which we then scan with our threat-detecting AI. ThreatSlayer saves anonymized URLs that cannot be associated with any individual user. By installing this extension to your browser, you confirm you read and agree to Interlock’s Terms of Service and Privacy Policy, which govern your download and use of the product.

Recent changes • KYC verification • Security stacking • $ILOCK claim is now possible

© 2025 WebExtension.net. All rights reserved.
Disclaimer: WebExtension.net is not affiliated with Google or the Chrome Web Store. All product names, logos, and brands are property of their respective owners. All extension data is collected from publicly available sources.
Go to top