Email Harvester 🕵

Email Harvester 🕵️‍♂️ 📋 Overview Email Harvester is a full‑stack web application that automatically discovers email addresses under a given domain, checks each against public data‑breach APIs to flag compromised accounts and presents the results in a simple, interactive interface. It combines a Flask‑powered Python backend for scraping and breach lookups with a Node.js/EJS frontend, all orchestrated via Docker Compose for one‑step deployment. 🎯 Key Features Domain email scraping: Crawl websites and public resources to extract email addresses. Asynchronous processing: Backend tasks run in parallel for high throughput. Secure vs. predicted: Classify emails found directly (“secure”) versus those inferred by pattern (“predicted”). Breach verification: Integrate with HaveIBeenPwned (or similar) to highlight compromised addresses. Intuitive UI: Built with Node.js and EJS templates for real‑time feedback. Persistent storage: Store results in MongoDB for later analysis and export. Containerized deployment: Docker Compose script brings up all services (backend, frontend, database) in one command. 🏗️ Architecture Backend (Flask/Python) Exposes REST endpoints to initiate domain scans, retrieve stored results and perform breach checks. Utilizes asynchronous HTTP requests and background workers to handle large crawls. Frontend (Node.js/EJS) Renders search form and results pages. Interacts with the backend API to start scans and fetch updates. Database (MongoDB) Persists scraped email addresses, classification tags and breach‑status metadata. Orchestration Docker Compose defines three services: backend, frontend and mongodb, ensuring consistent environments and easy scaling. 🔧 Prerequisites Docker Docker Compose 🚀 Getting Started Clone the repo ...

July 26, 2025 · 2 min · 310 words · AlBovo, Mark-74

Suricata Testing 🛡

Suricata testing 🛡️ 📋 Overview Suricata is a high‑performance, open‑source Network Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Network Security Monitoring (NSM) engine maintained by the Open Information Security Foundation (OISF). This repository provides a turnkey environment, using Docker and Docker Compose, to deploy Suricata in IDS mode (with an option for IPS) against a simulated industrial network, enabling you to test custom detection rules, generate realistic traffic patterns, and visualize alerts in real time. ...

July 26, 2025 · 3 min · 508 words · AlBovo, Mark-74