{"id":1084832,"date":"2022-08-08T12:08:09","date_gmt":"2022-08-08T16:08:09","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/home-open-source-nsa\/"},"modified":"2022-08-08T12:08:09","modified_gmt":"2022-08-08T16:08:09","slug":"home-open-source-nsa","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/home-open-source-nsa\/","title":{"rendered":"Home | Open Source @ NSA"},"content":{"rendered":"<p><p>           accumulo-python3         <\/p>\n<p>Build Python 3 applications that integrate with Apache Accumulo<\/p>\n<p>           Apache NIFI         <\/p>\n<p>Automates the flow of data between systems. NiFi implements concepts of Flow-Based Programming and solves common data flow problems faced by enterprises.<\/p>\n<p>           AppLocker-Guidance         <\/p>\n<p>Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber<\/p>\n<p>           AtomicWatch         <\/p>\n<p>Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber<\/p>\n<p>           BAM         <\/p>\n<p>The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber<\/p>\n<p>           beer-garden         <\/p>\n<p>The beer-garden application<\/p>\n<p>           BitLocker-Guidance         <\/p>\n<p>Configuration guidance for implementing BitLocker. #nsacyber<\/p>\n<p>           Blocking-Outdated-Web-Technologies         <\/p>\n<p>Guidance for blocking outdated web technologies. #nsacyber<\/p>\n<p>           Certificate-Authority-Situational-Awareness         <\/p>\n<p>Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber<\/p>\n<p>           Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs         <\/p>\n<p>Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber<\/p>\n<p>           CodeGov         <\/p>\n<p>Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber<\/p>\n<p>           Control-Flow-Integrity         <\/p>\n<p>A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber<\/p>\n<p>           Cyber-Challenge         <\/p>\n<p>Supporting files for cyber challenge exercises. #nsacyber<\/p>\n<p>           datawave         <\/p>\n<p>DataWave is an ingest\/query framework that leverages Apache Accumulo to provide fast, secure data access.<\/p>\n<p>           datawave-accumulo-service         <\/p>\n<p>           datawave-authorization-service         <\/p>\n<p>           datawave-base-rest-responses         <\/p>\n<p>           datawave-dictionary-service         <\/p>\n<p>The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are stored in Accumulo.<\/p>\n<p>           datawave-hazelcast-service         <\/p>\n<p>           datawave-in-memory-accumulo         <\/p>\n<p>           datawave-metrics-reporter         <\/p>\n<p>           datawave-microservices-root         <\/p>\n<p>           datawave-muchos         <\/p>\n<p>This project leverages Ansible to automate DataWave deployments on your cluster<\/p>\n<p>           datawave-query-metric-service         <\/p>\n<p>           datawave-spring-boot-starter         <\/p>\n<p>           datawave-spring-boot-starter-audit         <\/p>\n<p>           datawave-spring-boot-starter-cache         <\/p>\n<p>           DCP         <\/p>\n<p>Digest, stat, and copy files from one location to another in the same read pass<\/p>\n<p>           Detect-CVE-2017-15361-TPM         <\/p>\n<p>Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber<\/p>\n<p>           dm3k         <\/p>\n<p>The Decision Maximizer 3000 optimization project<\/p>\n<p>           Driver-Collider         <\/p>\n<p>Blocks drivers from loading by using a name collision technique. #nsacyber<\/p>\n<p>           emissary         <\/p>\n<p>Distributed P2P Data-driven Workflow Framework<\/p>\n<p>           enigma-simulator         <\/p>\n<p>An educational demonstration of breaking the Enigma machine<\/p>\n<p>           Event-Forwarding-Guidance         <\/p>\n<p>Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber<\/p>\n<p>           femto         <\/p>\n<p>Sequence Indexing and Search<\/p>\n<p>           fractalrabbit         <\/p>\n<p>Simulate realistic trajectory data seen through sporadic reporting<\/p>\n<p>           ghidra         <\/p>\n<p>Ghidra is a software reverse engineering (SRE) framework<\/p>\n<p>           ghidra-data         <\/p>\n<p>Supporting Data Archives for Ghidra<\/p>\n<p>           goSecure         <\/p>\n<p>An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber<\/p>\n<p>           GRASSMARLIN         <\/p>\n<p>Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber<\/p>\n<p>           Hardware-and-Firmware-Security-Guidance         <\/p>\n<p>Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF\/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber<\/p>\n<p>           HIRS         <\/p>\n<p>Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber<\/p>\n<p>           HTTP-Connectivity-Tester         <\/p>\n<p>Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber<\/p>\n<p>           lemongraph         <\/p>\n<p>Log-based transactional graph engine<\/p>\n<p>           lemongrenade         <\/p>\n<p>Data-driven automation platform<\/p>\n<p>           LOCKLEVEL         <\/p>\n<p>A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber<\/p>\n<p>           MADCert         <\/p>\n<p>Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.<\/p>\n<p>           Maplesyrup         <\/p>\n<p>Assesses CPU security of embedded devices. #nsacyber<\/p>\n<p>           Mitigating-Obsolete-TLS         <\/p>\n<p>Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber<\/p>\n<p>           Mitigating-Web-Shells         <\/p>\n<p>Guidance for mitigation web shells. #nsacyber<\/p>\n<p>           NB Gallery         <\/p>\n<p>nbgallery is a user-friendly Jupyter notebook sharing and collaboration platform.<\/p>\n<p>           netfil         <\/p>\n<p>A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber<\/p>\n<p>           netman         <\/p>\n<p>A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber<\/p>\n<p>           Open Network Operations Platform         <\/p>\n<p>Radically simplifies the operation of enterprise networks with SDN applications that reside on top of an OpenFlow-capable network controller.<\/p>\n<p>           OpenAttestation         <\/p>\n<p>Software Development Kit to enable remotely retrieval and verify target platforms integrity<\/p>\n<p>           paccor         <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/code.nsa.gov\/\" title=\"Home | Open Source @ NSA\" rel=\"noopener\">Home | Open Source @ NSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> accumulo-python3 Build Python 3 applications that integrate with Apache Accumulo Apache NIFI Automates the flow of data between systems.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/home-open-source-nsa\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1084832","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1084832"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1084832"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1084832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1084832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1084832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1084832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}