cisagov / trustymailLinks
Scan domains and return data based on trustworthy email best practices
☆212Updated 3 weeks ago
Alternatives and similar repositories for trustymail
Users that are interested in trustymail are comparing it to the libraries listed below
Sorting:
- A parser for SPF and DMARC DNS records☆282Updated last week
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆120Updated last year
- External monitoring for organization assets☆411Updated last year
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆163Updated last month
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated 3 weeks ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- ☆29Updated 6 years ago
- Domain name permutation as a service☆64Updated 5 months ago
- A site for CISA directives☆165Updated last year
- Backup of my phishing regular expression testing bench☆150Updated 8 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated last year
- Fast Advanced Spam Analysis Tool☆301Updated 2 weeks ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆293Updated 2 years ago
- Documentation of Cortex☆174Updated last year
- Scripts to pull DMARC reports from your mailbox (imap client) and convert it to Splunk friendly comma-separated key-value format☆94Updated 7 years ago
- An open source, self-service GRC tool to automate security assessments and compliance.☆193Updated 8 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆320Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- Boilerplate Incident Response Plan from "Starting Up Security"☆164Updated 4 years ago
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆111Updated last year
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated 11 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last month
- Scripts to help work with configuration audit files☆87Updated 2 years ago
- ☆48Updated 2 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Controls Assessment Specification☆70Updated 4 months ago
- ☆139Updated 2 weeks ago