nsacyber / RandPassGeneratorLinks
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆143Updated last year
Alternatives and similar repositories for RandPassGenerator
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 3 years ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆113Updated 7 months ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆74Updated 10 months ago
- A set of guidelines and best practices for an awesome engineering team☆253Updated this week
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93Updated 5 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆269Updated this week
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆96Updated last month
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆47Updated 10 months ago
- A site for CISA directives☆166Updated last year
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆81Updated 7 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆120Updated last year
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆44Updated this week
- A web application to streamline the development of STIGs from SRGs☆78Updated this week
- ☆70Updated 5 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 5 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- IOCs published by Black Lotus Labs☆122Updated last week