
Security Fundamentals
Turtles, Clams, and Cyber Threat Actors: Shell Usage
The Socket Threat Research Team uncovers how threat actors weaponize shell techniques across npm, PyPI, and Go ecosystems to maintain persistence and exfiltrate data.
A database of free and disposable email domains and a handy Node.js module for querying it.
A database of free and disposable email domains and a handy Node.js module for querying it.
Use the Node.js module or access the files in the ./data
directory and parse
with your language of choice.
In an effort to create the most up-to-date list of domains, the database can be synchronized with various lists from around the web. You can also add new domains directly by opening a pull request.
There are three key data files in this project:
Domains may only be a member of one list.
Run ./update
to pull in the latest domains from the sources listed in
sources.txt
. All new domains will be placed in free.txt
by default.
If any domains provide disposable email service, they may be moved to
disposable.txt
.
npm install --save freemail
var freemail = require('freemail');
freemail.isFree('smith@gmail.com');
> true
freemail.isFree('jack@mailinater.com');
> true
freemail.isDisposable('smith@gmail.com');
> false
freemail.isDisposable('jack@mailinater.com');
> true
FAQs
A database of free and disposable email domains and a handy Node.js module for querying it.
The npm package freemail receives a total of 15,878 weekly downloads. As such, freemail popularity was classified as popular.
We found that freemail demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security Fundamentals
The Socket Threat Research Team uncovers how threat actors weaponize shell techniques across npm, PyPI, and Go ecosystems to maintain persistence and exfiltrate data.
Security News
At VulnCon 2025, NIST scrapped its NVD consortium plans, admitted it can't keep up with CVEs, and outlined automation efforts amid a mounting backlog.
Product
We redesigned our GitHub PR comments to deliver clear, actionable security insights without adding noise to your workflow.