USArmyResearchLab / ARL-Open-Source-Guidance-and-Instructions
The U.S. Army Research Laboratory (ARL) Software Release Process for Unrestricted Public Release
☆44Updated 6 years ago
Alternatives and similar repositories for ARL-Open-Source-Guidance-and-Instructions:
Users that are interested in ARL-Open-Source-Guidance-and-Instructions are comparing it to the libraries listed below
- This is the old location for the FPKI Playbook. New location below.☆32Updated 3 years ago
- 2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.☆42Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆93Updated 11 months ago
- Python library for getting metadata from source code hosting tools☆50Updated last week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆112Updated 8 years ago
- Open Source software from The MITRE Corporation☆25Updated 10 months ago
- Federal PKI, X.509 certificate linter☆16Updated last month
- Federal data strategy website☆24Updated 2 weeks ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 7 years ago
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆20Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆21Updated last year
- This is the old location for the PIV Playbook. New location below.☆71Updated 3 years ago
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆28Updated last year
- IDManagement.gov is a collaboration between GSA and the Federal CIO Council. It is managed by the Identity Assurance and Trusted Access D…☆42Updated this week
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆68Updated last month
- NIST/NCCoE Mobile Threat Catalogue☆147Updated last year
- A repository for the data underlying the FedRamp Dashboard☆35Updated this week
- A collection of data about how federal agencies divide their agency coverage geospatially☆11Updated 9 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 5 months ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- ☆83Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 7 months ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆79Updated last month
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated this week
- FedRAMP Automation☆16Updated last year
- The OVAL Language Sandbox☆44Updated 4 years ago
- GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD re…☆31Updated 9 months ago
- OASIS CTI TC: Provides issue tracking and wiki pages for the STIX 2.x Work Products☆26Updated last month