NotRuler is a tool that allows Exchange Admins to remotely interact with Exchange servers to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler. It provides the ability to query Exchange mailboxes, check for compromise, extract stager addresses for malicious rules, extract VBScript used in forms, and check for 'homepage' and extract URLs. The tool has compiled binaries for Linux, OSX, and Windows, with information on setting up from source available in the getting-started guide. NotRuler operates in two modes: Rules to check for client-side rules, Forms to check for VBScript enabled forms, and Homepage to check for a custom homepage.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
King Phisher is a phishing campaign toolkit for testing and promoting user awareness through simulated attacks.
DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.
A tool for extracting static and dynamic features from Android APKs.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
CHIPSEC is a framework for analyzing the security of PC platforms and components, with tools for low-level interfaces and forensic capabilities.
Python package for processing and analyzing Zeek data with Pandas, scikit-learn, Kafka, and Spark, with offloading capabilities and improved data analysis features.
A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.
A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.
Detects and handles potential malware in Microsoft Exchange 2019 messages with various techniques and third-party libraries.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.