Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
  • SQL
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
  • Small Business
  • Resources
  • White Papers
  • Crypto News
  • Programming
    • Python
    • NodeJS
    • Java
    • Javascript
    • PHP
  • Android
  • SEO
  • Microsoft
    • Azure
    • Dot Net
    • Powershell
  • Networking
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    AI, ML and Data Science Books
    Useful Data Science Topics
    Data science blogs
    Data Science Resources
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Advanced Phishing Tool
    All Defense Tool
    CVE-2022-26809 RCE Exploit
    XLL Phishing
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    Git Cheat Sheet
    DevSecOps Playbook
    K3s – Lightweight Kubernetes
    Linux cheat sheet
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Tracking history of USB events on Linux
    Cyber Security Forensics
    Previous Next
  • SQL
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Awesome MySQL Resources
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    AI, ML and Data Science Books
    Useful Data Science Topics
    Data science blogs
    Data Science Resources
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Advanced Phishing Tool
    All Defense Tool
    CVE-2022-26809 RCE Exploit
    XLL Phishing
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    Git Cheat Sheet
    DevSecOps Playbook
    K3s – Lightweight Kubernetes
    Linux cheat sheet
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Tracking history of USB events on Linux
    Cyber Security Forensics
    Previous Next
  • SQL
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Awesome MySQL Resources
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Kali

Project iKy – Tool Collects Information From Email

Stella Sebastian
Posted by Stella Sebastian December 31, 2020

Project iKy – Tool That Collects Information From An Email

project-iky.png

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.

Installation

Clone repository

git clone https://gitlab.com/kennbroorg/iKy.git

Install Backend

Redis

You must install Redis

wget http://download.redis.io/redis-stable.tar.gz
tar xvzf redis-stable.tar.gz
cd redis-stable
make
sudo make install

Python stuff and Celery

You must install the libraries inside requirements.txt

python3 -m pip install -r requirements.txt

Install Frontend

Node

First of all, install nodejs.

Dependencias

Inside the directory, frontend install the dependencies

cd frontend
npm install

Wake up iKy Tool

Turn on Backend

Redis

Turn on the server in a terminal

redis-server

Python stuff and Celery

Turn on Celery in another terminal, within the directory backend

./celery.sh

Again, in another terminal turn on backend app from directory backend

python3 app.py

Turn on Frontend

Finally, to run frontend server, execute the following command from directory frontend

npm start

Screen after turn on iKy

project-iky2.png

Demo


WiKi Page
Github
Hacking Chrome Passwords

Tags: Collect Mail Information Collects Information From Email Email iKy Tool Project iKy
0 Shares
Share on Facebook Share on Twitter Share on Pinterest Share on Email
Stella Sebastian December 31, 2020
Previous Article Hacking Chrome Saved Passwords
Next Article Mail Notification Tools for Linux

Leave a Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Posts

Advanced Phishing Tool

May 22, 2022

All Defense Tool

May 20, 2022

CVE-2022-26809 RCE Exploit

May 19, 2022

XLL Phishing

May 19, 2022

You Might Also Enjoy

Tools

Advanced Phishing Tool

May 22, 2022
Resources

All Defense Tool

May 20, 2022
Exploits

CVE-2022-26809 RCE Exploit

May 19, 2022
Malware

XLL Phishing

May 19, 2022
Load More
  • ABOUT
  • ADVERTISEMENT
  • TEAM
  • JOBS
  • CONTACT
  • PRIVACY POLICY
  • DISCLOSURE

© 2021 Reconshell All Rights Reserved.