usnistgov / NIST-Tech-Pubs
XML metadata for NIST Technical Series Publications
☆25Updated this week
Alternatives and similar repositories for NIST-Tech-Pubs:
Users that are interested in NIST-Tech-Pubs are comparing it to the libraries listed below
- ☆10Updated last year
- ☆18Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆38Updated last week
- ☆15Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Tools for the OSCAL project☆35Updated 2 years ago
- Open Security Controls Assessment Language (OSCAL) Deep Differencing Tool☆33Updated last year
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Updated 9 years ago
- ☆15Updated 3 years ago
- Bugs Framework☆7Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 6 months ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆28Updated 3 weeks ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 10 months ago
- Posture Attribute Collection and Evaluation☆24Updated last year
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 9 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆16Updated 4 months ago
- ☆19Updated 8 months ago
- EPSScall☆12Updated 2 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- ☆11Updated 4 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Docker build of GovReady☆14Updated last year
- NIST 800-53 Baseline Configuration Tool☆9Updated 7 months ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated this week