cisagov / trustymail
Scan domains and return data based on trustworthy email best practices
☆197Updated 5 months ago
Alternatives and similar repositories for trustymail:
Users that are interested in trustymail are comparing it to the libraries listed below
- A parser for SPF and DMARC DNS records☆260Updated 3 weeks ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆120Updated last year
- ☆30Updated 6 years ago
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆143Updated 2 months ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆285Updated last year
- Vendor Security Model Contract☆97Updated 2 years ago
- External monitoring for organization assets☆384Updated 7 months ago
- Scripts to pull DMARC reports from your mailbox (imap client) and convert it to Splunk friendly comma-separated key-value format☆94Updated 6 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated this week
- Scan domains and return data based on HTTPS best practices☆674Updated 5 months ago
- Fraudmarc Community Edition: Open-source DMARC report analysis designed for government agencies☆152Updated 4 months ago
- A site for CISA directives☆157Updated 7 months ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated 4 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆305Updated 7 months ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆139Updated 3 months ago
- Domain name permutation as a service☆61Updated last week
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆275Updated 9 months ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- Multithreaded threat Intelligence gathering built with Python3☆173Updated 6 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- Python library for connecting to CertStream☆432Updated 5 months ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆83Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Axeman is a utility to retrieve certificates from Certificate Transparency Lists (CTLs)☆219Updated last year
- Python wrapper for urlscan.io's API☆102Updated 3 years ago
- Generate security policies and documents based on KPNs templates.☆37Updated 5 years ago
- An open source, self-service GRC tool to automate security assessments and compliance.☆185Updated last month
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago