A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber
☆80Nov 29, 2016Updated 9 years ago
Alternatives and similar repositories for netman
Users that are interested in netman are comparing it to the libraries listed below
Sorting:
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆112Mar 16, 2017Updated 8 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆50Jun 13, 2018Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Jun 8, 2016Updated 9 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆30Jun 10, 2017Updated 8 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Jun 2, 2016Updated 9 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆232Oct 31, 2025Updated 4 months ago
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆990Jun 27, 2017Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆169Nov 12, 2019Updated 6 years ago
- A FRONTEND Interfaces compliant device for the USRP that requires the UHD host code and supporting libraries to be installed☆16Sep 7, 2018Updated 7 years ago
- Enhanced textual vector layer searching in QGIS.☆79Jun 10, 2024Updated last year
- QGIS D3 Date and Time Heatmap☆134Jun 10, 2024Updated last year
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated 11 months ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆406Dec 8, 2022Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Data-driven automation platform☆315Jun 13, 2023Updated 2 years ago
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 6 years ago
- Shape Tools creates geodesic shapes and includes a number of geodesic tools for QGIS including the XY to Line tool, geodesic densify tool…☆166Jun 10, 2024Updated last year
- ☆18Mar 17, 2025Updated 11 months ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- QGIS tools to capture and zoom to coordinates using decimal, DMS, WKT, GeoJSON, MGRS, UTM, UPS, GEOREF, ECEF, H3, and Plus Codes notation…☆323Jun 10, 2024Updated last year
- NumPy aware dynamic Python compiler using LLVM☆12Nov 7, 2024Updated last year
- A kext to facilitate calling PE_enter_debugger on machines that don't respect Cmd-Ctrl-Opt-Shift-Esc☆15Aug 8, 2018Updated 7 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,596Dec 24, 2022Updated 3 years ago
- Accumulo backed time series database☆387Jan 8, 2026Updated last month
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- ☆34May 9, 2024Updated last year
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Nov 4, 2025Updated 3 months ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆15Aug 15, 2023Updated 2 years ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,033Feb 24, 2020Updated 6 years ago
- XS-Labs Coding Style Guide☆25Nov 4, 2024Updated last year
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Dashcoin with hardcoded values☆19Oct 18, 2017Updated 8 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆114Feb 19, 2021Updated 5 years ago