PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further processing/investigation. Fork of https://github.com/MSAdministrator/PhishReporter-Outlook-Add-In
☆35Jan 25, 2017Updated 9 years ago
Alternatives and similar repositories for PhishReporter-Outlook-Add-In
Users that are interested in PhishReporter-Outlook-Add-In are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phishing Outlook AddIn☆11Nov 16, 2017Updated 8 years ago
- A simple site cloner☆27Aug 20, 2017Updated 8 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 5 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 11 years ago
- An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.☆53Feb 7, 2024Updated 2 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- External telegram feeder for AIL framework☆19Jan 21, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- A small tool for creating and searching Golomb Compressed Sets☆13Jul 21, 2022Updated 3 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Bitpart is a messaging tool that runs on top of Signal to support activists, journalists, and human rights defenders.☆34Mar 1, 2026Updated 2 months ago
- Outlook add-in companion to report suspicious mail easily☆132Sep 1, 2022Updated 3 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Do not use☆15Jan 25, 2019Updated 7 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Sep 15, 2023Updated 2 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- Sample Binary Ninja Plugin☆23Jun 11, 2023Updated 2 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 10 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Jan 26, 2018Updated 8 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Jan 31, 2018Updated 8 years ago
- An HTTP proxy that naively injects NTLM data for the current user into outgoing requests☆14Nov 14, 2018Updated 7 years ago
- A Kanban Board control for WPF☆24Jan 7, 2026Updated 3 months ago
- InfoPath Phishing Repo Resource☆67Oct 26, 2017Updated 8 years ago
- ☆12Jul 20, 2021Updated 4 years ago
- ☆23Jan 10, 2012Updated 14 years ago
- Public scripts etc.☆19Jan 14, 2024Updated 2 years ago