A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.
☆115Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for eml_analyzer
Users that are interested in eml_analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An application to analyze the EML file☆343Updated this week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆289Oct 17, 2023Updated 2 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- A tool for extracting data from Arbor SP via its REST APIs in order to generate reports☆11Dec 19, 2022Updated 3 years ago
- E-Mail Header Analyzer☆696Apr 11, 2023Updated 2 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 5 years ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- GLPIScan is a vulnerability scanner for GLPI.☆28Jul 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerShell module for SentinelOne API☆28Mar 8, 2021Updated 5 years ago
- ☆13Mar 12, 2022Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆34Oct 31, 2017Updated 8 years ago
- C4T BuT S4D Attack-Defence CTF☆13Feb 6, 2022Updated 4 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated 2 weeks ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆56Jun 11, 2025Updated 9 months ago
- ☆21Jul 4, 2022Updated 3 years ago
- memory dump tool mirror for version 3.0.20171228.1☆17Oct 13, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Jan 31, 2016Updated 10 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 3 months ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆44Oct 10, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- BSim signatures and databases for Ghidra to recover function symbols with☆13Jul 11, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- Artifact collection tool for *nix systems☆214Mar 20, 2024Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Mar 14, 2026Updated last week
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆14Jun 6, 2024Updated last year
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago