A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.
☆115Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for eml_analyzer
Users that are interested in eml_analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An application to analyze the EML file☆348Updated this week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆290Apr 9, 2026Updated last week
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- Sigma Rules Engine inside the Linux Kernel using eBPF. Focusing on prevention capabilities☆235Updated this week
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 5 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- ☆13Mar 12, 2022Updated 4 years ago
- Recopilación de materiales sobre las diferentes titulaciones de esta familia profesional☆22May 10, 2024Updated last year
- A Discord Python Selfbot to put reactions on messages☆10Oct 12, 2025Updated 6 months ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆52Oct 31, 2017Updated 8 years ago
- Puppeteer based crawler to measure email and password exfiltration☆27Jan 7, 2026Updated 3 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆239Apr 8, 2026Updated last week
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Chrome extension that redacts potentially sensitive information before querying ChatGPT☆12Aug 10, 2023Updated 2 years ago
- memory dump tool mirror for version 3.0.20171228.1☆18Oct 13, 2021Updated 4 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- ☆14Jan 31, 2016Updated 10 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆41Feb 21, 2025Updated last year
- ☆13Nov 8, 2017Updated 8 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- TypeScript project starter for NEAR BOS☆10Mar 8, 2025Updated last year
- Python implementation of the XDL protocol☆14Jul 18, 2022Updated 3 years ago
- Hunting Queries for Defender ATP☆83Apr 1, 2026Updated 2 weeks ago
- Create Kali Linux VM with i3 using Vagrant and Ansible☆16Feb 18, 2020Updated 6 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- Auth Wiki Project Team 1☆10Aug 22, 2022Updated 3 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- ☆11Feb 1, 2024Updated 2 years ago
- HERE LIES THE MAGIC☆34Jun 28, 2016Updated 9 years ago
- Artifact collection tool for *nix systems☆216Mar 20, 2024Updated 2 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆14Jun 6, 2024Updated last year