Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
  • SQL
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
  • Small Business
  • Resources
  • White Papers
  • Crypto News
  • Programming
    • Python
    • NodeJS
    • Java
    • Javascript
    • PHP
    • Agile
    • TypeScript
  • Android
  • SEO
  • Microsoft
    • Azure
    • Dot Net
    • Powershell
  • Networking
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    Data Science Command Line
    Machine Learning on Geographical Data
    Data Science Squad Roadmap
    Defence Artificial Intelligence Strategy
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Tools and Techniques for Red Team
    Process Injection Enumeration Tool
    SSH based reverse shell
    XRAY GUI Starter Web Vulnerability Scanner
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    DevOps Learning resources
    Linux Ultimate Guide
    DevOps Roadmap 2022
    Collection of tips on Linux
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Awesome Forensics
    Awesome Event IDs
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Previous Next
  • SQL
    SQL Cheat Sheet
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    Data Science Command Line
    Machine Learning on Geographical Data
    Data Science Squad Roadmap
    Defence Artificial Intelligence Strategy
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Tools and Techniques for Red Team
    Process Injection Enumeration Tool
    SSH based reverse shell
    XRAY GUI Starter Web Vulnerability Scanner
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    DevOps Learning resources
    Linux Ultimate Guide
    DevOps Roadmap 2022
    Collection of tips on Linux
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Awesome Forensics
    Awesome Event IDs
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Previous Next
  • SQL
    SQL Cheat Sheet
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Kali

Project iKy – Tool Collects Information From Email

Stella Sebastian
Posted by Stella Sebastian December 31, 2020

superior_hosting_service

Project iKy – Tool That Collects Information From An Email

project-iky.png

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.

Installation

Clone repository

git clone https://gitlab.com/kennbroorg/iKy.git

Install Backend

Redis

You must install Redis

wget http://download.redis.io/redis-stable.tar.gz
tar xvzf redis-stable.tar.gz
cd redis-stable
make
sudo make install

Python stuff and Celery

You must install the libraries inside requirements.txt

python3 -m pip install -r requirements.txt

Install Frontend

Node

First of all, install nodejs.

Dependencias

Inside the directory, frontend install the dependencies

cd frontend
npm install

Wake up iKy Tool

Turn on Backend

Redis

Turn on the server in a terminal

redis-server

Python stuff and Celery

Turn on Celery in another terminal, within the directory backend

./celery.sh

Again, in another terminal turn on backend app from directory backend

python3 app.py

Turn on Frontend

Finally, to run frontend server, execute the following command from directory frontend

npm start

Screen after turn on iKy

project-iky2.png

Demo


WiKi Page
Github
Hacking Chrome Passwords

Tags: Collect Mail Information Collects Information From Email Email iKy Tool Project iKy
0 Shares
Share on Facebook Share on Twitter Share on Pinterest Share on Email
Stella Sebastian December 31, 2020
Previous Article Hacking Chrome Saved Passwords
Next Article Mail Notification Tools for Linux

Leave a Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Posts

Tools and Techniques for Red Team

December 26, 2022

Process Injection Enumeration Tool

December 20, 2022

SSH based reverse shell

December 18, 2022

XRAY GUI Starter Web Vulnerability Scanner

December 16, 2022
HostnExtra Ads
Neevahost ad post

You Might Also Enjoy

Resources

Tools and Techniques for Red Team

December 26, 2022
Tools

Process Injection Enumeration Tool

December 20, 2022
Tools

SSH based reverse shell

December 18, 2022
Tools

XRAY GUI Starter Web Vulnerability Scanner

December 16, 2022
Load More
  • ABOUT
  • ADVERTISEMENT
  • TEAM
  • JOBS
  • CONTACT
  • PRIVACY POLICY
  • DISCLOSURE

© 2021 Reconshell All Rights Reserved.