Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.
☆114Feb 3, 2025Updated last year
Alternatives and similar repositories for MADCert
Users that are interested in MADCert are comparing it to the libraries listed below
Sorting:
- ☆100Nov 27, 2024Updated last year
- SkillTree client libraries facilitating the rapid integration of a gamified tool training approach in conjunction with skills-service. Pr…☆95Updated this week
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated 11 months ago
- ☆18Mar 17, 2025Updated 11 months ago
- ☆11Aug 15, 2023Updated 2 years ago
- ☆17May 28, 2025Updated 9 months ago
- Distributed P2P Data-driven Workflow Framework☆278Updated this week
- Build Python 3 applications that integrate with Apache Accumulo☆34Oct 5, 2023Updated 2 years ago
- QGIS Lock Zoom to Tile Scale☆21Jun 10, 2024Updated last year
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated 2 weeks ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆83Aug 4, 2022Updated 3 years ago
- QGIS Tools to capture and zoom to MGRS coordinates.☆23Jun 10, 2024Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆664Updated this week
- Data-driven automation platform☆316Jun 13, 2023Updated 2 years ago
- Bash script that creates directories and files to organize a pentesting☆12May 26, 2021Updated 4 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆71Feb 9, 2026Updated 3 weeks ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Twitter Container isolates your Twitter activity from the rest of your web activity in order to prevent Twitter from tracking you outside…☆13May 21, 2024Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆207Updated this week
- The WASM Based Security Toolkit for the Web First Paradigm☆36Oct 3, 2023Updated 2 years ago
- Supporting Data Archives for Ghidra☆202Feb 10, 2026Updated 3 weeks ago
- An educational demonstration of breaking the Enigma machine☆490Aug 14, 2020Updated 5 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Jun 8, 2016Updated 9 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- Find RSA primes in files☆20May 14, 2022Updated 3 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆23Jul 27, 2022Updated 3 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Jun 5, 2024Updated last year
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆340Jun 6, 2019Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Dec 22, 2023Updated 2 years ago