nsacyber / RandPassGeneratorLinks
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆137Updated last year
Alternatives and similar repositories for RandPassGenerator
Users that are interested in RandPassGenerator are comparing it to the libraries listed below
Sorting:
- Guidance for blocking outdated web technologies. #nsacyber☆58Updated 3 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆121Updated 5 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆810Updated 6 months ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆110Updated 4 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆106Updated 4 months ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆279Updated 10 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆208Updated 3 weeks ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆402Updated 2 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- President's Cup Cybersecurity Competition Challenges☆172Updated last month
- ☆32Updated last year
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆73Updated 7 months ago
- an awesome list of active defense resources☆122Updated 4 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 9 months ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆157Updated 4 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆56Updated 6 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆190Updated this week
- This is a macOS hardening to read or set security configuration.☆146Updated 7 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆120Updated 11 months ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 months ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆46Updated 7 months ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago