Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆58Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for mx-intel
Users that are interested in mx-intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Server for receiving DMARC reports and passing them to a web service as JSON.☆19Sep 4, 2012Updated 13 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- Python library for SPF, DKIM, and DMARC email protections.☆42May 28, 2018Updated 7 years ago
- ☆41Jun 7, 2012Updated 13 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Oct 28, 2025Updated 5 months ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Aug 10, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆24Oct 18, 2022Updated 3 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Hunt for SQLite files used by various applications☆31Mar 1, 2026Updated last month
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 5 months ago
- some config files☆14Feb 23, 2026Updated last month
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated 3 weeks ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆118Jan 26, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆23Mar 17, 2024Updated 2 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆29Apr 4, 2025Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Inline MSIL in PowerShell☆15Apr 30, 2014Updated 11 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- ☆41May 16, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year