nsacyber / RandPassGenerator
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber
☆129Updated 8 months ago
Related projects: ⓘ
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆101Updated 3 years ago
- Logs key Windows process performance metrics. #nsacyber☆63Updated last year
- Guidance for blocking outdated web technologies. #nsacyber☆54Updated 2 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆100Updated 3 months ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆37Updated 3 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆118Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆66Updated 3 weeks ago
- ☆65Updated this week
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆288Updated 2 months ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆269Updated 3 years ago
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆22Updated last week
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆153Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆123Updated 2 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆260Updated 8 months ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆64Updated 3 weeks ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆235Updated this week
- A Passive SSH back-end and scanner.☆102Updated 3 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆248Updated 11 months ago
- ☆28Updated 4 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆121Updated 11 months ago
- ☆137Updated 3 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆765Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆67Updated 3 weeks ago
- ☆88Updated 4 months ago
- This is a macOS hardening to read or set security configuration.☆117Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆33Updated 8 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆241Updated last year
- Simulate realistic trajectory data seen through sporadic reporting☆144Updated 4 months ago
- ☆77Updated last year