wahlflo / eml_analyzerLinks
A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.
☆113Updated 2 years ago
Alternatives and similar repositories for eml_analyzer
Users that are interested in eml_analyzer are comparing it to the libraries listed below
Sorting:
- An application to analyze the EML file☆317Updated last week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆125Updated last week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆283Updated 2 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- MISP Playbooks☆222Updated 2 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Docker image for Velocidex Velociraptor☆142Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆279Updated 2 weeks ago
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- Repository resource for threat hunter☆158Updated 7 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- ☆66Updated 3 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆412Updated 7 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 3 years ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 5 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 9 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 2 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- Run several volatility plugins at the same time☆116Updated 3 years ago