Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆45Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Jun 10, 2017Updated 8 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- ☆18Mar 17, 2025Updated last year
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- SkillTree skills-client-examples☆31Mar 26, 2026Updated 2 weeks ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Dec 18, 2017Updated 8 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Dec 9, 2021Updated 4 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆36Jun 5, 2024Updated last year
- ☆12Aug 15, 2023Updated 2 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆165May 2, 2024Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Decision Maximizer 3000 optimization project☆10Jan 16, 2022Updated 4 years ago
- ☆18May 28, 2025Updated 10 months ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- ☆14Sep 8, 2023Updated 2 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆855Dec 23, 2024Updated last year
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 6 months ago
- ☆20Jan 10, 2025Updated last year
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A clean, accessible and semantic Joomla template with Sass inside!☆31Dec 1, 2015Updated 10 years ago
- Stuff related to scraping the Code Review StackExchange☆12Jan 19, 2023Updated 3 years ago
- Repository of GitHub Actions used by the Oh My Zsh project☆22Sep 4, 2020Updated 5 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- QGIS conversion tools to display the local date, time, time zone, convert between UNIX time (Epoch), Julian dates, ISO8601, calculate the…☆24Jun 10, 2024Updated last year
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆236Oct 31, 2025Updated 5 months ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆26Dec 12, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- Bash script to brute force your id_rsa password☆21Jan 22, 2020Updated 6 years ago
- Hex community are packages the community maintains on Hex☆18Apr 3, 2016Updated 10 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago