USArmyResearchLab / ARL-Open-Source-Guidance-and-InstructionsLinks
The U.S. Army Research Laboratory (ARL) Software Release Process for Unrestricted Public Release
☆47Updated 7 years ago
Alternatives and similar repositories for ARL-Open-Source-Guidance-and-Instructions
Users that are interested in ARL-Open-Source-Guidance-and-Instructions are comparing it to the libraries listed below
Sorting:
- This is the old location for the PIV Playbook. New location below.☆73Updated 4 years ago
- OpenSSF Governance and Legal Docs☆73Updated 2 months ago
- The Digital Standard is an ambitious, community-led effort to build a framework to test and rate products and services on the basis of pr…☆135Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆269Updated this week
- OpenSSF Endusers Working Group☆28Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆95Updated last year
- Home of the .gov registry☆29Updated last year
- Federal data strategy website☆25Updated 2 months ago
- Python library for getting metadata from source code hosting tools☆52Updated 7 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆27Updated 6 years ago
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆76Updated last year
- NIST/NCCoE Mobile Threat Catalogue☆149Updated 3 months ago
- A repository for the data underlying the FedRamp Dashboard☆36Updated this week
- US Digital Registry.☆90Updated 2 years ago
- FedRAMP Automation☆16Updated 2 years ago
- CVE Automation Working Group☆180Updated this week
- CVE Project Documentation☆87Updated 4 months ago
- Public home for NIST open source software catalog☆19Updated 2 months ago
- Cyber Intelligence Ontology☆56Updated 8 years ago
- An automated scanner and web dashboard for tracking TLS deployment across news organizations☆103Updated 3 years ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆223Updated last year
- YAML schema, examples, and validators for OpenControl format.☆75Updated 6 years ago
- Structured Threat Intelligence Graph☆97Updated last month
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 8 years ago
- Federal Source Code Policy☆249Updated 7 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 6 months ago
- A site for CISA directives☆167Updated last year
- XML Schema for Digital Forensics XML☆35Updated 9 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆49Updated 2 years ago