0sm0s1z / MailSniper
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for MailSniper
- ☆21Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Create Password lists for cracking lyrical passwords☆14Updated 6 months ago
- ☆11Updated last year
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆26Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆52Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- PSEmailRep is a simple PowerShell module to interface with the EmailRep.io API.☆25Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- ☆13Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆26Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Maltego transform for visualizing Nessus scan data☆45Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 6 years ago
- Admin for☆15Updated 6 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 7 months ago
- A database for storing, querying and doing stats on credential leaks☆38Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆17Updated 5 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆15Updated 5 years ago