efuller-gov / dm3kLinks
The Decision Maximizer 3000 optimization project
☆10Updated 4 years ago
Alternatives and similar repositories for dm3k
Users that are interested in dm3k are comparing it to the libraries listed below
Sorting:
- ☆99Updated last year
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆205Updated last week
- ☆34Updated last year
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Updated last year
- File Access Policy Daemon☆231Updated last week
- SkillTree skills-client-examples☆32Updated 3 weeks ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆164Updated last year
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated 2 years ago
- ☆54Updated 3 weeks ago
- The Linux port of the Sysinternals Sysmon tool.☆281Updated 4 months ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Updated this week
- ☆51Updated last month
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆36Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Updated last year
- AssemblyLine 4: File triage and malware analysis☆421Updated this week
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆22Updated this week
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆535Updated this week
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆846Updated last year
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆100Updated last week
- Powerful Python tool to analyze PDF documents☆26Updated 3 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆518Updated last year
- Logs key Windows process performance metrics. #nsacyber☆69Updated 3 years ago
- Python library to read and write ISOs☆175Updated 11 months ago
- Python bindings for TSS☆81Updated 2 months ago
- Security Information and Event Management in Minecraft☆118Updated 3 years ago
- A client and library to cve-services 2.x to provide CVE management for CNA and CERTs☆28Updated 6 months ago
- Supporting Data Archives for Ghidra☆202Updated 2 weeks ago
- Repo to manage tshark.dev, deployed to netlify☆77Updated this week
- Library and tools to access the Volume Shadow Snapshot (VSS) format☆114Updated last month