cisagov / trustymailLinks
Scan domains and return data based on trustworthy email best practices
☆207Updated last week
Alternatives and similar repositories for trustymail
Users that are interested in trustymail are comparing it to the libraries listed below
Sorting:
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Updated last year
- A parser for SPF and DMARC DNS records☆276Updated 2 weeks ago
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆156Updated 2 months ago
- Domain name permutation as a service☆62Updated 3 months ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- ☆29Updated 6 years ago
- External monitoring for organization assets☆402Updated last year
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆302Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆144Updated 4 months ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆291Updated last year
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 9 months ago
- Python library for connecting to CertStream☆448Updated 10 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆312Updated this week
- Boilerplate Incident Response Plan from "Starting Up Security"☆164Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- ☆137Updated last week
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆216Updated last week
- Python3 library and command line for GreyNoise☆153Updated this week
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆32Updated last year
- Sample programs to access the API☆85Updated last month
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- ☆46Updated 2 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆221Updated 4 months ago
- ☆120Updated last year
- Scan domains and return data based on HTTPS best practices☆681Updated last week