cisagov / trustymail
Scan domains and return data based on trustworthy email best practices
☆203Updated 2 months ago
Alternatives and similar repositories for trustymail
Users that are interested in trustymail are comparing it to the libraries listed below
Sorting:
- A parser for SPF and DMARC DNS records☆268Updated 2 months ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Updated last year
- Dashboard to collect, analyze, and respond to reported phishing emails.☆290Updated last year
- Scan domains and receive advice based on their BIMI, DKIM, DMARC, and SPF records☆154Updated 3 weeks ago
- ☆29Updated 6 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- Domain name permutation as a service☆61Updated 2 months ago
- External monitoring for organization assets☆397Updated 11 months ago
- A site for CISA directives☆163Updated 11 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆306Updated this week
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- Fast Advanced Spam Analysis Tool☆298Updated last year
- Scan domains and return data based on HTTPS best practices☆678Updated 2 months ago
- Boilerplate Incident Response Plan from "Starting Up Security"☆163Updated 4 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆143Updated 3 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 10 months ago
- ☆135Updated last week
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 8 months ago
- A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.☆383Updated 3 years ago
- DPS' Lightweight Investigation Notebook☆429Updated last year
- Python3 library and command line for GreyNoise☆152Updated this week
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆294Updated last year
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆144Updated 2 years ago
- Python library for connecting to CertStream☆445Updated 9 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆209Updated last week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆105Updated 2 weeks ago
- Sample programs to access the API☆81Updated 2 weeks ago