NSA Cybersecurity Directorate's Projects
Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber
Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber
The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber
Configuration guidance for implementing BitLocker. #nsacyber
Guidance for blocking outdated web technologies. #nsacyber
Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
Supporting files for cyber challenge exercises. #nsacyber
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
Blocks drivers from loading by using a name collision technique. #nsacyber
OT security monitoring #nsacyber
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber
A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber
Assesses CPU security of embedded devices. #nsacyber
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
Guidance for mitigation web shells. #nsacyber
A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber
A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber
NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate
The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. #nsacyber
Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber
Logs key Windows process performance metrics. #nsacyber
A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber