NationalSecurityAgency / pelzLinks
☆32Updated last year
Alternatives and similar repositories for pelz
Users that are interested in pelz are comparing it to the libraries listed below
Sorting:
- ☆94Updated 6 months ago
- SkillTree☆27Updated 3 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆106Updated 4 months ago
- ☆53Updated 5 months ago
- SkillTree skills-client-examples☆32Updated 2 weeks ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 3 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆21Updated 2 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- OpenSSF Project Template☆18Updated last year
- SkillTree documentation, covering client integration, dashboard administration and deployment, and contribution guidelines.☆54Updated last week
- Data to test capa's code and rules.☆42Updated 2 weeks ago
- Use CDNJS as a source to build hashes of known JS/CSS/IMG/... content used all over the internet☆14Updated last month
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆189Updated this week
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 3 months ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated last month
- An official book about Rizin☆79Updated 3 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Maat is a centralized software integrity measurement and attestation (M&A) service☆28Updated 7 months ago
- Network Tools☆32Updated last year
- Next generation of Qubes OS builder☆22Updated last week
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆74Updated 3 weeks ago
- Exploit, Malware and Vulnerability Scoring Application