nsacyber / RandPassGeneratorLinks
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆143Updated 2 years ago
Alternatives and similar repositories for RandPassGenerator
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
Sorting:
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- Configuration guidance for implementing BitLocker. #nsacyber☆127Updated 6 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Updated 3 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Updated last year
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆114Updated 4 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆119Updated 2 weeks ago
- A set of guidelines and best practices for an awesome engineering team☆263Updated last month
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆330Updated 10 months ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆100Updated this week
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆50Updated last week
- CrowdStrike's Open Source Policy & Contribution Guide☆49Updated 2 months ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated last week
- an awesome list of active defense resources☆128Updated 5 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- A web application to streamline the development of STIGs from SRGs☆83Updated 2 weeks ago
- Extracts fields from zeek logs, compatible with zeek-cut☆25Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆60Updated 7 years ago
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated last week
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago