HaveIBeenPwned / EmailAddressExtractor
A project to rapidly extract all email addresses from any files in a given path
☆106Updated 2 weeks ago
Alternatives and similar repositories for EmailAddressExtractor:
Users that are interested in EmailAddressExtractor are comparing it to the libraries listed below
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆142Updated 2 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- A tool for mapping cyber crime☆136Updated last week
- Security Operations Chef☆17Updated last week
- DEFCON 31 slide deck and video link☆59Updated 10 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆120Updated 2 years ago
- The clarion call tells you if someone is logging into an AitM proxy that is proxying your M365 login page☆79Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆83Updated 2 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆71Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆54Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆40Updated 4 months ago
- ☆33Updated 5 months ago
- VirtualGHOST Detection Tool☆91Updated 11 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- High signal information security sources Goggle.☆67Updated 2 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆117Updated 2 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- A real fake social engineering app☆107Updated 2 weeks ago
- ☆74Updated last month
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆40Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆120Updated last week
- OWASP Foundation web repository☆32Updated 2 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 4 months ago
- POSIX script for mail security checks of domain names☆75Updated last year
- A list of RMMs designed to be used in automation to build alerts☆110Updated 2 weeks ago
- God Mode Detection Rules☆134Updated 8 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 6 months ago