keraattin / EmailAnalyzer
With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can generate reports.
☆246Updated last year
Alternatives and similar repositories for EmailAnalyzer:
Users that are interested in EmailAnalyzer are comparing it to the libraries listed below
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆174Updated last month
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated this week
- CLI tools for forensic investigation of Windows artifacts☆324Updated 3 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated 3 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆118Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆175Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆348Updated 3 weeks ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 10 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 8 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Useful resources about phishing email analysis☆78Updated 2 weeks ago
- MISP Playbooks☆183Updated this week
- Advanced Bash script designed for conducting digital forensics on Linux systems☆138Updated 10 months ago
- An OSINT Framework project based on Python☆105Updated 8 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆384Updated this week
- Discover and monitor internet assets using favicon hashes across search engines.☆157Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated 2 years ago
- Building a consolidated RSS feed for articles about cyberattacks☆65Updated this week
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆155Updated this week
- ☆132Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 7 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated 8 months ago
- Regular Expressions List used in Digital Forensic Tasks☆82Updated last year
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆215Updated 4 months ago
- ☆165Updated 11 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year