Detects potential malware using libyara.NET with custom fixes. Extracts archives with SevenZipSharp. Disarms malicious PDFs based on xdpdf algorithm. Parses subject/body/headers with regex and aho-corasik. Checks MessageId and source subnet of messages. Sends user email notifications about potentially malicious messages. Marks malicious messages with special header for archiving and rejection. Uses metrics to determine maliciousness and bruteforces archive attachments with generated dictionary. Utilizes third-party libraries like aho-corasick, xdpdf, SevenZipSharp, libyara.NET, log4net, log4net.Ext.Json, ipnetwork, and html-agility-pack.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open-source phishing toolkit for businesses and penetration testers.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A data-mining and deep web asset search engine for breach analysis and prevention services.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.
Extract local data storage of an Android application in one click.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.