TKCERT / mail-security-testerLinks
A testing framework for mail security and filtering solutions.
☆244Updated last year
Alternatives and similar repositories for mail-security-tester
Users that are interested in mail-security-tester are comparing it to the libraries listed below
Sorting:
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- Respounder detects presence of responder in the network.☆316Updated 5 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆235Updated 6 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- penetration testing scripts☆136Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- The Seeker of IOC☆129Updated 4 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆369Updated 6 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆219Updated 7 years ago
- Automated Tactics Techniques & Procedures☆255Updated 2 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- Internet data acquisition☆149Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆170Updated 3 months ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆140Updated 7 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆317Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆210Updated 9 years ago