nsacyber / RandPassGenerator
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆136Updated last year
Alternatives and similar repositories for RandPassGenerator:
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
- Guidance for blocking outdated web technologies. #nsacyber☆55Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆69Updated 5 months ago
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆103Updated 7 months ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆42Updated 3 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- A set of guidelines and best practices for an awesome engineering team☆222Updated last week
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆106Updated 3 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆72Updated 2 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆249Updated last year
- Supporting files for cyber challenge exercises. #nsacyber☆44Updated 6 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆298Updated 2 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 4 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 6 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 2 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆204Updated 2 months ago
- ☆32Updated 8 months ago
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆42Updated 2 months ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- SkillTree documentation, covering client integration, dashboard administration and deployment, and contribution guidelines.☆48Updated 2 weeks ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆271Updated last year
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Files vetted, and approved for public release☆53Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 6 months ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆82Updated 2 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆398Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- AssemblyLine 4: File triage and malware analysis☆270Updated last week
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago