Email Harvester 🕵

Email Harvester 🕵️‍♂️ 📋 Overview Email Harvester is a full‑stack web application that automatically discovers email addresses under a given domain, checks each against public data‑breach APIs to flag compromised accounts and presents the results in a simple, interactive interface. It combines a Flask‑powered Python backend for scraping and breach lookups with a Node.js/EJS frontend, all orchestrated via Docker Compose for one‑step deployment. 🎯 Key Features Domain email scraping: Crawl websites and public resources to extract email addresses. Asynchronous processing: Backend tasks run in parallel for high throughput. Secure vs. predicted: Classify emails found directly (“secure”) versus those inferred by pattern (“predicted”). Breach verification: Integrate with HaveIBeenPwned (or similar) to highlight compromised addresses. Intuitive UI: Built with Node.js and EJS templates for real‑time feedback. Persistent storage: Store results in MongoDB for later analysis and export. Containerized deployment: Docker Compose script brings up all services (backend, frontend, database) in one command. 🏗️ Architecture Backend (Flask/Python) Exposes REST endpoints to initiate domain scans, retrieve stored results and perform breach checks. Utilizes asynchronous HTTP requests and background workers to handle large crawls. Frontend (Node.js/EJS) Renders search form and results pages. Interacts with the backend API to start scans and fetch updates. Database (MongoDB) Persists scraped email addresses, classification tags and breach‑status metadata. Orchestration Docker Compose defines three services: backend, frontend and mongodb, ensuring consistent environments and easy scaling. 🔧 Prerequisites Docker Docker Compose 🚀 Getting Started Clone the repo ...

July 26, 2025 · 2 min · 310 words · AlBovo, Mark-74

Suricata Testing 🛡

Suricata testing 🛡️ 📋 Overview Suricata is a high‑performance, open‑source Network Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Network Security Monitoring (NSM) engine maintained by the Open Information Security Foundation (OISF). This repository provides a turnkey environment, using Docker and Docker Compose, to deploy Suricata in IDS mode (with an option for IPS) against a simulated industrial network, enabling you to test custom detection rules, generate realistic traffic patterns, and visualize alerts in real time. ...

July 26, 2025 · 3 min · 508 words · AlBovo, Mark-74

Solitario Croce

Solitario Croce ♣️ Development of a game 🎮 in C# using the WPF framework; the game is a solitaire based on customized playing cards. Development team 🤖 This project has been developed by: Agostini Alan Angiolillo Matteo Balducci Marco Bovo Alan Davide Game 🎮 The game we developed is the Solitario a Croce. ...

July 22, 2024 · 1 min · 208 words · AlBovo, Mark-74

Minesweeper 🚩

Minesweeper Game 🚩 Minesweeper is a classic computer game that requires a combination of strategy and logic. The game is played on a grid, and the objective is to uncover all the hidden mines without detonating any of them. To do this, players click on individual squares, and the numbers revealed indicate the number of mines in adjacent squares. Armed with this information, players use deductive reasoning to mark squares they suspect contain mines with flags and gradually clear the grid of all non-mined areas. The challenge lies in making calculated guesses and avoiding mines, and successful Minesweeper players often develop a keen eye for patterns and strategies to conquer the game. ...

May 27, 2024 · 2 min · 320 words · AlBovo