NationalSecurityAgency / DCP
Digest, stat, and copy files from one location to another in the same read pass
☆331Updated 5 years ago
Alternatives and similar repositories for DCP:
Users that are interested in DCP are comparing it to the libraries listed below
- Data-driven automation platform☆302Updated last year
- Assesses CPU security of embedded devices. #nsacyber☆138Updated 8 years ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆584Updated this week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆111Updated 8 years ago
- Distributed P2P Data-driven Workflow Framework☆249Updated this week
- Log-based transactional graph engine☆1,140Updated 4 months ago
- A WebSocket library for use with Apache Accumulo☆60Updated 4 months ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,334Updated 5 years ago
- MAC address age tracking☆576Updated this week
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆167Updated 5 years ago
- ☆378Updated 12 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆149Updated last week
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆75Updated 8 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆154Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆578Updated 7 years ago
- Quantum Insert☆212Updated 6 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 7 years ago
- The USG is Good, not Bad☆404Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆978Updated 7 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆238Updated 7 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last week
- Fake sshd that logs ip addresses, usernames, and passwords.☆193Updated 8 years ago
- Site for NSA's Open Source project listing☆270Updated 2 months ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- EternalRocks worm☆453Updated 7 years ago
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆106Updated 7 years ago
- Supporting Data Archives for Ghidra☆179Updated this week
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 9 months ago