Orange-Cyberdefense / disposable-mailbox-dockerLinks
A self hosted yopmail like server running in a docker
☆63Updated last year
Alternatives and similar repositories for disposable-mailbox-docker
Users that are interested in disposable-mailbox-docker are comparing it to the libraries listed below
Sorting:
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 10 months ago
 - Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
 - nmap scripts (nse files) to identify vulnerabilities☆29Updated 2 weeks ago
 - Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
 - A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆14Updated 4 years ago
 - CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
 - A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆62Updated 5 years ago
 - Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
 - Gather information from an email address connected to Office 365☆85Updated 2 years ago
 - EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
 - Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
 - A DMARC scanning and parsing tool.☆33Updated 6 months ago
 - ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
 - ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
 - A WLAN red team framework.☆155Updated last year
 - ☆10Updated 2 years ago
 - Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
 - Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
 - A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆28Updated 2 years ago
 - kb=$(cat sillynotes.txt)☆45Updated this week
 - Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
 - Modular framework to exploit UPS devices☆66Updated 2 years ago
 - Docker container for the gophish phishing framework.☆52Updated 3 weeks ago
 - credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
 - A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Updated last year
 - Windows Exploit Protection Settings (Ultimate) GUI☆70Updated 4 months ago
 - Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Updated last year
 - Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Updated 6 months ago
 - URL fingerprinting made easy☆89Updated last year
 - Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago