NationalSecurityAgency / maatLinks
Maat is a centralized software integrity measurement and attestation (M&A) service
☆29Updated 8 months ago
Alternatives and similar repositories for maat
Users that are interested in maat are comparing it to the libraries listed below
Sorting:
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated 3 weeks ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆39Updated this week
- ☆32Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- OpenSSF Project Template☆18Updated last year
- Official repository for the Open Vulnerability and Assessment Language☆63Updated last month
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 10 months ago
- OWASP Ontology-driven Threat Modelling framework☆38Updated 2 years ago
- Bugs Framework☆8Updated 2 months ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆24Updated last year
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆192Updated this week
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated last month
- Next generation of Qubes OS builder☆22Updated last week
- A framework for parsing binary data.☆17Updated 2 years ago
- ☆53Updated 6 months ago
- MSR Project Freta☆77Updated 11 months ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆35Updated 4 months ago
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- Tool to verify conformance to the PIV data model per most recent releases of FIPS 201 and associated publications☆27Updated 6 months ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 3 weeks ago
- Securing open-source package ecosystems by originating, validating, and augmenting build attestations.☆42Updated this week
- CyHy Dashboard☆17Updated this week
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 3 months ago
- Structured Threat Intelligence Graph☆95Updated 3 months ago
- Sample CICD Pipelines for OneFuzz☆27Updated 2 years ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated last year
- Static code analysis of refpolicy style SELinux policy☆44Updated 3 months ago