wahlflo / eml_analyzerLinks
A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.
☆112Updated 2 years ago
Alternatives and similar repositories for eml_analyzer
Users that are interested in eml_analyzer are comparing it to the libraries listed below
Sorting:
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆125Updated last week
- An application to analyze the EML file☆317Updated last week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆283Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆279Updated 2 weeks ago
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- MISP Playbooks☆222Updated 2 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- CLI tools for forensic investigation of Windows artifacts☆347Updated 5 months ago
- Traps web spiders☆77Updated 5 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆94Updated 3 weeks ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Updated last year
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 9 months ago
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- A curated list of KAPE-related resources☆177Updated 8 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Docker image for Velocidex Velociraptor☆142Updated last week
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- ☆132Updated 2 years ago
- Yet another Ransomware gang tracker☆548Updated last week
- An open-source self-hosted purple team management web application.☆296Updated 3 weeks ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- Website for ail-typo-squatting library☆69Updated 3 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago