{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"BAM","owner":"nsacyber","isFork":false,"description":"The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber","allTopics":["metadata","binary","binary-analysis"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":8,"starsCount":146,"forksCount":27,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-02T21:40:04.495Z"}},{"type":"Public archive","name":"WALKOFF","owner":"nsacyber","isFork":false,"description":"A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber","allTopics":["python","security","devops","automation","framework","administration","integration","analytics","orchestration-framework","sysadmin","orchestration","cybersecurity","automation-framework","orchestrator","walkoff","walkoff-workflows","workflow","walkoff-apps"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":24,"issueCount":33,"starsCount":1191,"forksCount":221,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-12T04:07:15.316Z"}},{"type":"Public archive","name":"serial2pcap","owner":"nsacyber","isFork":false,"description":"Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) format. #nsacyber","allTopics":["converter","pcap","convert","conversion","control-systems","scada","ics-scada"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":65,"forksCount":35,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-25T19:25:32.141Z"}},{"type":"Public archive","name":"goSecure","owner":"nsacyber","isFork":false,"description":"An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber","allTopics":["linux","raspberry-pi","strongswan","vpn"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":3,"starsCount":971,"forksCount":171,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-27T20:17:10.548Z"}},{"type":"Public archive","name":"AtomicWatch","owner":"nsacyber","isFork":false,"description":"Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber","allTopics":["atom","cpu","processor","intel"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":25,"forksCount":19,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-10T00:20:43.429Z"}},{"type":"Public archive","name":"Splunk-Assessment-of-Mitigation-Implementations","owner":"nsacyber","isFork":false,"description":"Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber","allTopics":["windows","auditing","scoring","audit","assessment","compliance","splunk"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":72,"forksCount":40,"license":"The Unlicense","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-05-25T22:46:52.381Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}