CIRCL / IMAP-Proxy
Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)
☆30Updated 6 years ago
Alternatives and similar repositories for IMAP-Proxy:
Users that are interested in IMAP-Proxy are comparing it to the libraries listed below
- ☆22Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 6 months ago
- first commit☆20Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Mass DNS resolution tool☆36Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Notebook collection☆10Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Network Defender Toolkit☆18Updated 11 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- MS17-010 Windows SMB RCE -- Full subnet scanner☆24Updated 7 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆14Updated 2 weeks ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- Host files with DNS☆32Updated 9 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Updated 9 years ago
- splunk alert script to create resilient tickets☆10Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 3 weeks ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago