HaveIBeenPwned / EmailAddressExtractorLinks
A project to rapidly extract all email addresses from any files in a given path
☆140Updated last week
Alternatives and similar repositories for EmailAddressExtractor
Users that are interested in EmailAddressExtractor are comparing it to the libraries listed below
Sorting:
- A repository to collaborate on the UX rebuild of Have I Been Pwned☆49Updated last week
- The clarion call tells you if someone is logging into an AitM proxy that is proxying your M365 login page☆80Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆139Updated last month
- Make your keepass 2.x more secure.☆59Updated 11 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆136Updated 4 months ago
- A tool for mapping cyber crime☆140Updated last month
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated this week
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆72Updated last year
- A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API☆868Updated last month
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆337Updated last year
- Canary Detection☆168Updated 2 weeks ago
- Deliberately making password creation a true hell☆159Updated 2 years ago
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆102Updated last month
- Traps web spiders☆74Updated 4 years ago
- Putting a leash on naughty AWS permissions☆122Updated last month
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 5 months ago
- A very opinionated list of security tools☆126Updated 2 months ago
- DEFCON 31 slide deck and video link☆61Updated 11 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆52Updated last week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 10 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆249Updated last week
- Customized CVE FEED Notifier☆114Updated last month
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆126Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆96Updated 5 months ago
- Wordlist to crack .zip-file password☆203Updated 2 years ago