TBHKOC/JSHKOC]
A collaboration with Kei ^^ I really enjoyed painting it, the background is still missing, Kei is already in charge of that detail >:) I hope she likes it
#tbhkoc#tbhk#jshkoc#esfumitaoc#meimeioc#toiletboundhanakokun #meioc#jibakushounenhanakokun
π₯³ Iβm excited to announce the release of a new version of #meioc (Mail Extractor IoC), a lightweight script designed to analyze emails and extract key Indicators of Compromise.
π Iβve introduced DKIM analysis and multiple improvements.
π #GitHub: github.com/drego85/meioc
Nel 2024 aziende importanti hanno ancora domini mail con record SPF assenti o errati π
E poi si chiederanno perchè le e-mail che mandano ai clienti finisco nello spam...
#email#spf#meioc#antispam
I have released version 1.3 of #meioc.: github.com/drego85/meioc
What's new (short):
- Fixed tldextract
- Migration from the BytesParser library to email
- Ability to save the result in a file
- Identification of "base" HTML TAGs
Thz @hackingbutlegal and other contributors!
The #meioc report now includes the Date and the Return-Path field.
It is now a great tool for #OSINT!
Stay connected because other news will arrive for version 1.3! π
The #meioc report now includes the Date and the Return-Path field.
It is now a great tool for #OSINT!
Stay connected because other news will arrive for version 1.3! π
I have released version 1.2 of #meioc.: github.com/drego85/meioc
What's new (short):
* Standardized JSON structure;
* SPF verification improved;
* Conforms to RFC5321/22;
* Exclusion of local IPv6;
* Error handling in the HTML code analysis;
* Minor bug fix.
EG of analysis:
I have released version 1.2 of #meioc.: github.com/drego85/meioc
What's new (short):
* Standardized JSON structure;
* SPF verification improved;
* Conforms to RFC5321/22;
* Exclusion of local IPv6;
* Error handling in the HTML code analysis;
* Minor bug fix.
EG of analysis:
I updated the graphics of my blog! π
You like it? π or π
Yes, I'm thinking of writing some new article. In English!
Starting from the official presentation of @PhishingArmy and #meioc!
Site: andreadraghetti.it#blog#wordpress
Questa Γ¨ l'analisi fatta con #meiocpastebin.com/Ri3L0mxN
La mail Γ¨ partita da 194.182.67.236 (Aruba) per poi arrivare su Gandi e recapitarla all'eMail di complottilunari[.]info
I due mail server NON sono open relay, quindi probabile che il Phisher abbia un account mail Gandi
For every line of code I write in #meioc, I realize that the eMail arrives at destinations by magic!
And this magic is often used by spammers to evade filters and send scams/phishing/malware!
Version 1.0 of #meioc is released: github.com/drego85/meioc
* Rewritten a large part of the code
* The output JSON is validated by RFC 4627
* Check SPF Record
* Check X-Sender record
* Minor bug fix
* Remove option β-fβ to indicate the file name
Version 1.0 of #meioc is released: github.com/drego85/meioc
* Rewritten a large part of the code
* The output JSON is validated by RFC 4627
* Check SPF Record
* Check X-Sender record
* Minor bug fix
* Remove option β-fβ to indicate the file name