lunarca / pyemailprotectionslibLinks
Python library for SPF, DKIM, and DMARC email protections.
☆43Updated 7 years ago
Alternatives and similar repositories for pyemailprotectionslib
Users that are interested in pyemailprotectionslib are comparing it to the libraries listed below
Sorting:
- WStalker: an easy proxy☆25Updated 5 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- ☆14Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Event Data Collector☆40Updated 2 weeks ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Enumerate RIDs using pure Python☆32Updated 3 weeks ago
- Fake SMB and SAMR data☆11Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Automated 802.1x Bypass☆87Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 6 years ago
- A Django application to help red team operators manage a library of domain names☆167Updated 2 years ago
- ☆12Updated 6 years ago
- various slides and presentations I've worked on☆19Updated 10 months ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- ☆57Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Methods of C2☆22Updated 10 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- ☆37Updated 5 years ago