cd ../tools

public cyber tool / public / browser-side

Compromised Email Checklist

Use this sequence from a trusted device. It is not incident response service, but it gives a practical path to contain common damage.

recover --email-account local analysis / no remote fetch
recover --email-account

Operational priorities

Secure email first: it is often the recovery key for many other accounts.

Check forwarding rules, filters and app passwords: attackers use them to keep hidden access.

After regaining control, change passwords on important accounts that use that email.

references