cd ../tools
public cyber tool / public / browser-side
Compromised Email Checklist
Use this sequence from a trusted device. It is not incident response service, but it gives a practical path to contain common damage.
recover --email-account
local analysis / no remote fetch
recover --email-account
Operational priorities
Secure email first: it is often the recovery key for many other accounts.
Check forwarding rules, filters and app passwords: attackers use them to keep hidden access.
After regaining control, change passwords on important accounts that use that email.
references