Orange-Cyberdefense / disposable-mailbox-dockerLinks
A self hosted yopmail like server running in a docker
☆63Updated last year
Alternatives and similar repositories for disposable-mailbox-docker
Users that are interested in disposable-mailbox-docker are comparing it to the libraries listed below
Sorting:
- nmap scripts (nse files) to identify vulnerabilities☆31Updated last week
- Docker container for the gophish phishing framework.☆52Updated 3 weeks ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 7 months ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆79Updated last year
- Ansible playbook to automate environmental setup for internal and external penetration testing☆31Updated 2 years ago
- A DMARC scanning and parsing tool.☆33Updated 4 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 6 months ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆12Updated 3 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Updated last year
- Check if your provider is blocking you!☆105Updated 3 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Updated 3 months ago
- Source code and examples for Antignis☆43Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆71Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆114Updated last year
- kb=$(cat sillynotes.txt)☆41Updated last week
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆18Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 months ago