cisagov / trustymailView external linksLinks
Scan domains and return data based on trustworthy email best practices
☆216Dec 31, 2025Updated last month
Alternatives and similar repositories for trustymail
Users that are interested in trustymail are comparing it to the libraries listed below
Sorting:
- Scan domains and return data based on HTTPS best practices☆688Dec 31, 2025Updated last month
- Automated pshtt, trustymail, and sslyze scanning☆28Updated this week
- A parser for SPF and DMARC DNS records☆303Jan 17, 2026Updated 3 weeks ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.☆388Aug 6, 2021Updated 4 years ago
- Gather domains as a precursor to scanning☆20Updated this week
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated this week
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated last week
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- A Python package and CLI for parsing aggregate and forensic DMARC reports☆1,201Jan 23, 2026Updated 3 weeks ago
- Code to generate SQLite database of a group of GitHub organizations, their repositories, memberships, and contributors.☆15Nov 7, 2017Updated 8 years ago
- The Consumer Financial Protection Bureau's user interface framework☆54Jul 10, 2020Updated 5 years ago
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆170Feb 8, 2026Updated last week
- A site for CISA directives☆167Jun 5, 2024Updated last year
- Scripts to pull DMARC reports from your mailbox (imap client) and convert it to Splunk friendly comma-separated key-value format☆94Mar 18, 2018Updated 7 years ago
- OVAL Documentation☆15Aug 4, 2017Updated 8 years ago
- How the federal .gov domain space is doing at best practices and policies.☆95Jun 9, 2020Updated 5 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Nov 26, 2018Updated 7 years ago
- A command line remote for a Roku media box.☆17Apr 10, 2015Updated 10 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Compact large SPF chains into flat blocks of IP addresses☆41Sep 27, 2025Updated 4 months ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Oct 9, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- A small tool to export your "attachments" (screenshots/images) from your discord backups☆10Aug 10, 2022Updated 3 years ago
- A tool for parsing DMARC aggregate reports.☆11Nov 10, 2022Updated 3 years ago
- A collection of utils to work with the Tezos blockchain using Elixir: parsing Micheline, verifying Tezos signed messages, deriving Tezos …☆14Updated this week
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆10Jun 26, 2024Updated last year
- Lightweight program that pollinates STHs between Certificate Transparency logs and auditors☆26Aug 7, 2025Updated 6 months ago
- Charts for the Consumer Financial Protection Bureau☆12Mar 26, 2024Updated last year
- The CBP Style Guide to compliment the CBP Theme. The style guide describes CBP theme components and patterns and how to use them.☆13Dec 6, 2022Updated 3 years ago
- Manages Git identities, including SSH keys☆11Aug 24, 2023Updated 2 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 4 years ago