This repository contains a list of disposable and temporary email address domains often used for spamming or abusing services. The file allowlist.conf includes email domains that are mistakenly identified as disposable. Contributors can create PRs to add or remove domains, citing sources for verification. New disposable domains should be added directly into disposable_email_blocklist.conf in the specified format.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
StegSolve is a steganography analysis tool with image analysis features.
A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
Aggregates known Android security vulnerabilities with detailed examples and analysis.
Repository for apps to be used in Shuffle with compatibility instructions.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Extract local data storage of an Android application in one click.
Steghide is a steganography program for hiding data in image and audio files.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.