Orange-Cyberdefense / disposable-mailbox-dockerLinks
A self hosted yopmail like server running in a docker
☆64Updated last year
Alternatives and similar repositories for disposable-mailbox-docker
Users that are interested in disposable-mailbox-docker are comparing it to the libraries listed below
Sorting:
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 8 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- nmap scripts (nse files) to identify vulnerabilities☆31Updated last week
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 6 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Docker container for the gophish phishing framework.☆52Updated last month
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆18Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆82Updated last week
- Traps web spiders☆75Updated 5 years ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆12Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- kb=$(cat sillynotes.txt)☆42Updated this week
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆28Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- Multithread reverse shell listener☆26Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Gather information from an email address connected to Office 365☆84Updated 2 years ago
- Another Hardening Windows Tool☆51Updated last year
- ☆37Updated 9 months ago