Pr0t3an / charger
PST Parser using pypff - Export all email headers and body to csv or json
☆9Updated 5 years ago
Alternatives and similar repositories for charger:
Users that are interested in charger are comparing it to the libraries listed below
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆10Updated 6 years ago
- Check IP or Domain reputation against open-source Blacklists.☆66Updated last year
- Python Digital Forensics Cookbook by Packt☆14Updated 4 years ago
- Detect leaks in security event logs.☆20Updated 5 years ago
- The FASTEST way to parse Email☆17Updated 3 years ago
- Learning Python for Forensics by Packt Publishing☆118Updated 2 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Python module to read, parse and converting Microsoft Outlook MSG E-Mail files.☆54Updated 2 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Twitter geo intelligence tool. Generates a Leaflet map for a given user or from an existing collection of tweets.☆33Updated 5 years ago
- ☆16Updated 10 months ago
- Learning Python for Forensics, Second Edition, Published by Packt☆47Updated 2 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Collect email addresses by crawling search engine results.☆29Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 8 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- Code for the Python Digital Forensics Cookbook☆55Updated 7 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 3 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- A Maltego transforms collection for Twint☆32Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆29Updated 4 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago