yaraMail Logo

yaraMail

0
Free
Visit Website

Yara Scanner For IMAP Feeds and saved Streams Reads an smtp formatted email file or connects to IMAP/POP server, reads emails and extracts attachments. Scans attachments with chosen Yara rule file. Writes the results to a Report File. Deletes the tmp dir created. Usage: IMAP Feed: python yaraMail.py -e -o sampleReport.txt -i -u me@you.com -p password -f inbox sample.yar imap.gmail.com POP Feed: python yaraMail.py -e -o sampleReport.txt -w -u you@me.com -p password sample.yar pop3.live.com From File: python yaraMail.py -e -o sampleReport.txt sample.yar SampleMail.txt Reports: Here is an example of the report print out From: Kevin Breen email@email.com Subject: Subject Line Att Name: Name of attatch.ext Matched Rules: Rule_Name1 Rule_Name2 Misc: The Attachement extract also extracts any Body to the EMail in either text/plain or text/HTML format -The text body of the email is typically named as part-001.ksh (this is what python mime guesses the ext as) -The HTML Body of the text is typically named as part-002.html ToDo: -Add verbose output

FEATURES

ALTERNATIVES

Hale is a botnet command & control monitor/spy with a modular design and various monitoring capabilities, including IRC and HTTP, to aid in botnet hunting and research.

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

DOS attack by sending fake BPDUs to disrupt switches' STP engines.

CapTipper is a python tool to analyze, explore, and revive HTTP malicious traffic.

Open source security-oriented language for describing protocols and applying security policies on captured traffic.

Visualize and analyze network relationships with AfterGlow

Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.

A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved