wahlflo / eml_analyzerView external linksLinks
A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.
☆114Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for eml_analyzer
Users that are interested in eml_analyzer are comparing it to the libraries listed below
Sorting:
- An application to analyze the EML file☆338Updated this week
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆288Oct 17, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Werkzeug password cracker☆18Nov 14, 2024Updated last year
- ☆13Mar 12, 2022Updated 3 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 8 months ago
- ☆21Jul 4, 2022Updated 3 years ago
- Pentest Report Manager☆26Apr 2, 2025Updated 10 months ago
- E-Mail Header Analyzer☆697Apr 11, 2023Updated 2 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Oct 10, 2024Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 4 months ago
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆29Apr 6, 2020Updated 5 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆29Jun 24, 2020Updated 5 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- ThePhish: an automated phishing email analysis tool☆1,328Aug 1, 2024Updated last year
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆56Jun 11, 2025Updated 8 months ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Run Velociraptor on Security Onion☆40Jul 27, 2022Updated 3 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 8 months ago
- ☆25Jan 19, 2026Updated 3 weeks ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Mahr and Edwards (2018). Using Language Input and Lexical Processing to Predict Vocabulary Size☆11May 22, 2018Updated 7 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆234Updated this week
- C# based evtx parser with lots of extras☆340Sep 4, 2025Updated 5 months ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆40Feb 21, 2025Updated 11 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87May 11, 2024Updated last year
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year