cisagov / trustymailLinks
Scan domains and return data based on trustworthy email best practices
☆206Updated last week
Alternatives and similar repositories for trustymail
Users that are interested in trustymail are comparing it to the libraries listed below
Sorting:
- A parser for SPF and DMARC DNS records☆273Updated last week
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Updated last year
- ☆29Updated 6 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆290Updated last year
- External monitoring for organization assets☆400Updated 11 months ago
- Domain name permutation as a service☆62Updated 2 months ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- A site for CISA directives☆163Updated 11 months ago
- Python3 library and command line for GreyNoise☆153Updated this week
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆430Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆309Updated this week
- Vendor Security Model Contract☆98Updated 2 years ago
- DNSDB API Client, C Version☆99Updated 6 months ago
- Scripts to pull DMARC reports from your mailbox (imap client) and convert it to Splunk friendly comma-separated key-value format☆94Updated 7 years ago
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆112Updated 10 months ago
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆154Updated last month
- Scan domains and return data based on HTTPS best practices☆681Updated last week
- ☆135Updated this week
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆296Updated last year
- Documentation of Cortex☆174Updated last year
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Boilerplate Incident Response Plan from "Starting Up Security"☆163Updated 4 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆106Updated last week
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆32Updated last year
- ☆118Updated last year
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆18Updated 3 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆314Updated 11 months ago