CERT-Polska / mailgooseLinks
A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.
☆182Updated 2 weeks ago
Alternatives and similar repositories for mailgoose
Users that are interested in mailgoose are comparing it to the libraries listed below
Sorting:
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated 3 weeks ago
- Canary Detection☆188Updated last month
- God Mode Detection Rules☆134Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆80Updated 7 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 7 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆179Updated 6 months ago
- ☆74Updated last week
- VirtualGHOST Detection Tool☆96Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated last month
- Dredging up secrets from the depths of the file system☆132Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆148Updated last month
- Extracting IoC data from eMail☆138Updated 4 months ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- ☆27Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆95Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆160Updated last month
- ☆116Updated 4 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- ☆40Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- A tool for mapping cyber crime☆222Updated 7 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 3 weeks ago