martijnvangeffen / DMARC-reportView external linksLinks
Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report and can upload the data to PowerBI for even more rich reporting
☆28Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for DMARC-report
Users that are interested in DMARC-report are comparing it to the libraries listed below
Sorting:
- ☆20Nov 13, 2025Updated 3 months ago
- Documentation on the Cyber Defense Matrix☆24Apr 19, 2023Updated 2 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆14Feb 2, 2026Updated 2 weeks ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆34Oct 9, 2020Updated 5 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Labs and course material for Advania course 'PowerShell Advanced Fundamentals'☆11Jan 12, 2026Updated last month
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆39Dec 19, 2025Updated last month
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Lot of gnuwin32 tools with aliases in PowerShell☆11Aug 20, 2015Updated 10 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- Plans for DIY nanodrop☆10Oct 18, 2019Updated 6 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- ☆16Oct 31, 2025Updated 3 months ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- I use powershell to help me in my work as a consultant to make make my work simpler and some of those script I like to share☆10Jul 2, 2025Updated 7 months ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Mar 27, 2024Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Dump iceriver firmware files and filesystem☆10Oct 3, 2023Updated 2 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Repository to record all Cyber Security resources shared with the Certificate IV in Cyber Security students at TAFE Digital.☆14Sep 4, 2022Updated 3 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- Archive for data from mcbroken.com.☆13Feb 9, 2026Updated last week
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago