CIRCL / IMAP-Proxy
Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)
☆30Updated 6 years ago
Alternatives and similar repositories for IMAP-Proxy
Users that are interested in IMAP-Proxy are comparing it to the libraries listed below
Sorting:
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- ☆22Updated 7 years ago
- first commit☆20Updated last year
- Notebook collection☆10Updated 6 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Plugins written for CVE-Search☆25Updated 4 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- ☆11Updated 7 years ago
- ☆27Updated 7 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆15Updated 2 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Web of trust grapher☆38Updated last week
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Updated 9 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 8 years ago
- Network Defender Toolkit☆18Updated 11 years ago