Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆58Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for mx-intel
Users that are interested in mx-intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆41Jun 7, 2012Updated 13 years ago
- ☆18Oct 28, 2025Updated 4 months ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- An MTA-STS policy server/reverse proxy. Uses LetsEncrypt to fetch certs for your host.☆14Jan 9, 2026Updated 2 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- Extract messages from a local Microsoft Teams installation☆16Jan 14, 2023Updated 3 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- some config files☆14Feb 23, 2026Updated last month
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆29Apr 4, 2025Updated 11 months ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- ☆41May 16, 2018Updated 7 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year