nsacyber / RandPassGeneratorLinks
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆143Updated 2 years ago
Alternatives and similar repositories for RandPassGenerator
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
Sorting:
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆82Updated 3 weeks ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Updated 11 months ago
- A set of guidelines and best practices for an awesome engineering team☆262Updated last month
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆50Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆119Updated this week
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 2 weeks ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆25Updated last year
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆76Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated last month
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated 2 years ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆99Updated this week
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- A site for CISA directives☆167Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆330Updated 9 months ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- Analyze assets authorization, who has access to what and how☆76Updated 10 months ago
- an awesome list of active defense resources☆128Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated last month
- IOCs published by Black Lotus Labs☆124Updated 2 months ago