TKCERT / mail-security-tester
A testing framework for mail security and filtering solutions.
☆244Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mail-security-tester
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆231Updated this week
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆168Updated last year
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 6 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Updated 3 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆391Updated 4 years ago
- Automated Tactics Techniques & Procedures☆251Updated last year
- penetration testing scripts☆137Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆260Updated 7 years ago
- Query and report user logons relations from MS Windows Security Events☆240Updated 6 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Respounder detects presence of responder in the network.☆314Updated 5 years ago
- Test Blue Team detections without running any attack.☆271Updated 6 months ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Internet data acquisition☆147Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆311Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Updated 6 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆218Updated 6 years ago
- Automatic firewall rule orchestator.☆82Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 4 years ago
- Tools for the Computer Incident Response Team☆142Updated 7 years ago
- A bunch of useful SSH tools for powershell☆118Updated 6 years ago
- ☆279Updated 6 years ago