NationalSecurityAgency / emissaryLinks
Distributed P2P Data-driven Workflow Framework
☆261Updated this week
Alternatives and similar repositories for emissary
Users that are interested in emissary are comparing it to the libraries listed below
Sorting:
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆622Updated this week
- Data-driven automation platform☆305Updated 2 years ago
- Accumulo backed time series database☆385Updated 3 months ago
- Digest, stat, and copy files from one location to another in the same read pass☆336Updated 6 years ago
- A WebSocket library for use with Apache Accumulo☆62Updated this week
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆108Updated 5 months ago
- ☆32Updated last year
- Site for NSA's Open Source project listing☆293Updated this week
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆116Updated 4 years ago
- SkillTree client libraries facilitating the rapid integration of a gamified tool training approach in conjunction with skills-service. Pr…☆89Updated 3 weeks ago
- SkillTree skills-client-examples☆32Updated last month
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆192Updated this week
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆280Updated 11 months ago
- Log-based transactional graph engine☆1,149Updated 9 months ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 8 years ago
- The U.S. Army Research Laboratory (ARL) Software Release Process for Unrestricted Public Release☆47Updated 6 years ago
- A graph-focused data visualisation and interactive analysis application.☆396Updated this week
- A Tool for Complex and Scalable Data Access Policy Enforcement☆97Updated 3 years ago
- SkillTree☆27Updated this week
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆17Updated 11 months ago
- Build Python 3 applications that integrate with Apache Accumulo☆32Updated last year
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆139Updated last year