See tool:
I will first give a little background to this tool and then at the end explain the two problems with it.
This tool is very unique and unlike any other I've come across. It allows you to highlight any text in your Chromium web browser, and then quickly search it in any search engine of your choice. Little bubble icons popup automatically which shorten the time it takes to search the selected text to within milliseconds, rather than using a right click context menu,etc.
The search engines I use are:
A.) Google
B.)www.northboot.xyz
C.) duckduckgo
D.) Yandex
E.) Bing
It might've had some malicious stuff in its source code, i discovered it on google's extension webstore. It's no longer available. I've caught browser extensions in google webstore in the past having malicious code in them.
Here is it's crx: Select-Search,bubble search engine,am using,webstore.crx | Files.fm.
Thats it's source code. A weird problem I've been having since, I guess, I started using Zorin is that when I change the .crx to a .zip file to unzip/extract it's source code. It doesnt work. I used to do this no problem with Windows 7. For Zorin I end up having to use WinRAR.
Why cant Zorin's native extractor work with this?
Next, the reason why I need to look at its source code is because it might be rerouting my searches and logging them. I think my ublock origin caught it trying to send my searches to the URL: https://go.skimresources.com/?id=31959X1726082&isjs=1&jv=15.6.0&sref=https
Once I did extract the source code I tried to search for any IP address, or http or URL of any kind, but I couldnt find anything. However I'm not sure I wrote my grep -r -d recurse command chain correctly to search all of that properly.
So, my issues are: 1.) Why cant Zorin natively unzip a .zip file?
And 2.) How do I create a command chain that searches the unzipped contents for any kind of IP address/URL, or search for anyway that it might be phoning home info maliciously.
-Thanks.