nsacyber / paccorLinks
The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. #nsacyber
☆70Updated last month
Alternatives and similar repositories for paccor
Users that are interested in paccor are comparing it to the libraries listed below
Sorting:
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆199Updated this week
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 6 months ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Logs key Windows process performance metrics. #nsacyber☆67Updated 2 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- ☆55Updated 9 months ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆81Updated 8 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- The Alternative Fileless File System☆57Updated 6 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆68Updated 5 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆55Updated 8 years ago
- Tools to assist in forensicating docker☆84Updated 7 months ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 6 months ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆47Updated 7 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Updated 6 years ago
- Endpoint monitoring stack.☆19Updated 9 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago