Orange-Cyberdefense / disposable-mailbox-dockerLinks
A self hosted yopmail like server running in a docker
☆64Updated last year
Alternatives and similar repositories for disposable-mailbox-docker
Users that are interested in disposable-mailbox-docker are comparing it to the libraries listed below
Sorting:
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
- Docker container for the gophish phishing framework.☆52Updated 2 weeks ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 9 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- URL fingerprinting made easy☆89Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 7 months ago
- nmap scripts (nse files) to identify vulnerabilities☆30Updated last week
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆13Updated 4 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- ☆16Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 months ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆11Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Updated 4 months ago
- A Network Automation framework focused on Cyber-Security☆48Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆45Updated this week
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆55Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Gather information from an email address connected to Office 365☆84Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago