A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆146Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for RandPassGenerator
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
Sorting:
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆114Feb 19, 2021Updated 5 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Dec 9, 2021Updated 4 years ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆71Feb 9, 2026Updated last month
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆164May 2, 2024Updated last year
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆45Jul 19, 2021Updated 4 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆50Jun 13, 2018Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆852Dec 23, 2024Updated last year
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,035Feb 24, 2020Updated 6 years ago
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 7 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,592Dec 24, 2022Updated 3 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Feb 3, 2025Updated last year
- QGIS conversion tools to display the local date, time, time zone, convert between UNIX time (Epoch), Julian dates, ISO8601, calculate the…☆24Jun 10, 2024Updated last year
- Automatically fix all software bugs.☆20Aug 10, 2025Updated 7 months ago
- SkillTree client libraries facilitating the rapid integration of a gamified tool training approach in conjunction with skills-service. Pr…☆95Mar 2, 2026Updated 2 weeks ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆83Aug 4, 2022Updated 3 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Dec 18, 2017Updated 8 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆80Nov 29, 2016Updated 9 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- Unpacking tool for Philips SmartTV firmware (Fusion platform)☆24May 28, 2014Updated 11 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆30Jun 10, 2017Updated 8 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- The Decision Maximizer 3000 optimization project☆10Jan 16, 2022Updated 4 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 9 months ago
- OT security monitoring #nsacyber☆615Jan 7, 2024Updated 2 years ago
- ☆16Sep 1, 2025Updated 6 months ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago