Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆57Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for mx-intel
Users that are interested in mx-intel are comparing it to the libraries listed below
Sorting:
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- ☆41May 16, 2018Updated 7 years ago
- Python library for SPF, DKIM, and DMARC email protections.☆42May 28, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆29Apr 4, 2025Updated 10 months ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- ☆11Mar 12, 2021Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- ☆11Dec 18, 2018Updated 7 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 8 months ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Jan 9, 2024Updated 2 years ago
- some config files☆14Feb 23, 2026Updated last week
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- ☆18Oct 28, 2025Updated 4 months ago