Sublime rules for email attack detection, prevention, and threat hunting.
-
Updated
Jun 14, 2024 - YAML
Sublime rules for email attack detection, prevention, and threat hunting.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
A curated list of awesome resources related to enhancing your enterprise Email Security
Scan domains and return data based on trustworthy email best practices
A privacy-first email solution that provides an email alias @maily.org to hide the original email address when using the internet
This program provides hands-on, practical experience in tackling real-world cybersecurity challenges. The projects are designed to give you a comprehensive understanding of different aspects of cybersecurity, enhancing your skills and preparing you for a career in this dynamic field.
SMTP (email) server with a focus on simplicity, security, and ease of operation [mirror]
mail without fail
URL / IP / Email defanging with Golang. Make IoC harmless.
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
This is a template for hosting a mta-sts.txt file using GitHub Pages
URL / IP / Email defanging with Javascript. Make IoC harmless.
SPF-finder is designed to check for the validation of a Sender Policy Framework (SPF) record in a domain's DNS settings. It uses the nslookup command to query the DNS server for the SPF record, and then parses the output to determine if the record is present or not. It also have functionality for reading a list of domains.
OutlookDSD - A simple add-in for Outlook that shows a messages DKIM, SPF and DMARC status.
Plesk Extension for SpamExperts' services integration
Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps orgs investigate phishing campaigns, gauge third-party risk & mitigate these risks. All orgs on the list are exposed to higher risk of threat actors gaining initial entry to their org, supply chain, and customers.
Aliyun CTF Teapot mail server POC for DKIM
A command line tool to check if a single (or multiple) email addresses have been compromised.
Add a description, image, and links to the email-security topic page so that developers can more easily learn about it.
To associate your repository with the email-security topic, visit your repo's landing page and select "manage topics."