Orange-Cyberdefense / disposable-mailbox-dockerLinks
A self hosted yopmail like server running in a docker
☆66Updated last year
Alternatives and similar repositories for disposable-mailbox-docker
Users that are interested in disposable-mailbox-docker are comparing it to the libraries listed below
Sorting:
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆47Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63Updated 5 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- nmap scripts (nse files) to identify vulnerabilities☆29Updated last month
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆28Updated 2 years ago
- A basic flask based Outlook Web Honey pot☆69Updated 2 years ago
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆45Updated last year
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 5 months ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆27Updated 5 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- A WLAN red team framework.☆155Updated last year
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆37Updated this week
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated 2 weeks ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- Docker container for the gophish phishing framework.☆52Updated 2 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆14Updated last month
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated last month
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Updated 8 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago