Software and Tools
Access and download the software, tools, and methods that the SEI creates, tests, refines, and disseminates. Organizations and individuals worldwide use these technologies and management techniques to improve the results of software projects, the quality and behavior of software systems, and the security and survivability of networked systems.
Filter by
-
Simulating Realistic Human Activity Using Large Language Model Directives
• Technical Report
By Dustin D. Updyke , Thomas G. Podnar , Sean Huff
The authors explore how activities generated from the GHOSTS Framework’s NPC client compare to activities produced by GHOSTS’ default behavior and LLMs.
DOWNLOAD -
CERT NetSA Security Suite
• Software
By None
The Network Situational Awareness (NetSA) group at CERT has developed and maintains a suite of open source tools for monitoring large-scale networks using flow data.
DOWNLOAD -
DevSecOps Platform Independent Model (PIM)
• Handbook
By Carol Woody , Joe Yankel , Aaron K. Reffett , Nataliya Shevchenko , Lyndsi A. Hughes , Timothy A. Chick , Mary Popeck , Brent Frye
The DevSecOps PIM enables organizations to implement DevSecOps in a secure, safe, and sustainable way.
DOWNLOAD -
Software Assurance Guidance and Evaluation (SAGE) Tool
• White Paper
By Ebonie McNeil , Hasan Yasar , Luiz Antunes , Robert Schiela
The Software Assurance Guidance and Evaluation (SAGE) tool helps an organization assess the security of its systems development and operations practices.
DOWNLOAD -
CERT Kaiju
• Software
By None
CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite.
DOWNLOAD -
Overview of Practices and Processes of the CMMC 1.0 Assessment Guides (CMMC 1.0)
• White Paper
By Douglas Gardner
This document is intended to help anyone unfamiliar with cybersecurity standards get started with the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC).
DOWNLOAD -
Mission-Based Prioritization Tool (Coded)
• Software
By None
An alternate version of the tool to implement the mission-based prioritization of agile backlogs that includes a small amount of Visual Basic code that creates a tab containing the sorted …
DOWNLOAD -
Mission-Based Prioritization Tool (Code Free)
• Software
By None
A no-frills tool to implement the mission-based prioritization of agile backlogs that accounts for restrictions on government computers; the results must be manually sorted.
DOWNLOAD -
KalKi Platform Main Repository
• Software
By Sebastián Echeverría
KalKi is an IoT platform for allowing untrusted IoT devices to connect to a network in a secure way, protecting both the IoT device and the network from malicious attackers.
DOWNLOAD -
SEI-ACE
• Software
By Sebastián Echeverría , Grace Lewis
SEI-ACE is an extension of the ACE Working Group proposal to support authentication and authorization of devices in disadvantaged environments.
DOWNLOAD -
SEI CERT Coding Standards Wiki
• Handbook
By None
This wiki supports the development of coding standards for commonly used programming languages such as C, C++, Java, and Perl, and the Android™ platform.
DOWNLOAD -
DSOI-ALL / devops-microcosm
• Software
By None
Hands-on guidance to build DevSecOps pipeline
DOWNLOAD -
CWD Tools for Improving Cyber Simulations
• None
By None
Download the open source software tools that the SEI developed to create realistic cyber simulations or access information to learn more about each one.
DOWNLOAD -
SCAIFE-API YAML Specification
• Software
By None
The YAML file specifies the SCAIFE-API definition in a format developers can use to view, modify, and automatically generate code from.
DOWNLOAD -
Artificial Intelligence and Cyber Intelligence: An Implementation Guide
• Educational Material
By None
This guide provides practical steps for implementing artificial intelligence with cyber intelligence.
DOWNLOAD -
Infrastructure as Code: Final Report
• White Paper
By John Klein , Doug Reynolds
This project explored the feasibility of infrastructure as code, developed prototype tools, populated a model of the deployment architecture, and automatically generated IaC scripts from the model.
DOWNLOAD -
Supplementary Materials for a Case Study of Analysis Contracts with the ACTIVE tool
• Dataset
By None
This archive contains the source code of the ACTIVE tool, and models/data from a case study of analysis contracts in two domains: thread scheduling, and battery design.
DOWNLOAD -
SCALe Collection
• None
By None
The CERT Division's Source Code Analysis Laboratory (SCALe) offers conformance testing of C and Java language software systems against the CERT C Secure Coding Standard and the CERT Oracle Secure …
DOWNLOAD -
Analysis Pipeline
• Software
By None
The Analysis Pipeline supports inspection of flow records as they are created.
DOWNLOAD -
CERT Vulnerability Data Archive and Tools
• Dataset
By Allen D. Householder
CERT archive of non-sensitive vulnerability information in the vulnerability reports database.
DOWNLOAD -
CERT Linux Forensics Tools Repository
• Software
By None
The CERT Linux Forensics Tools Repository provides many useful packages for cyber forensics acquisition and analysis practitioners.
DOWNLOAD -
CERT fixbuf
• Software
By None
CERT fixbuf is a compliant implementation of the IPFIX Protocol.
DOWNLOAD -
CERT super_mediator
• Software
By None
CERT super_mediator is an IPFIX mediator for use with the YAF and SiLK tools.
DOWNLOAD -
Clang-Tidy
• Software
By None
Clang-Tidy is Clang-based C++ "linter" tool that provides an extensible framework for diagnosing and fixing typical programming errors.
DOWNLOAD -
The CERT Guide to Coordinated Vulnerability Disclosure
• Special Report
By Allen D. Householder , Garret Wassermann , Christopher King , Art Manion
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go …
DOWNLOAD -
CERT Tapioca
• Software
By None
CERT Tapioca is a network-layer MITM proxy utility that checks for apps that fail to validate certificates and investigates content of network traffic, including HTTP and HTTPS.
DOWNLOAD -
CERT SiLK IPset
• Software
By None
CERT SiLK IPset can be used to build and manipulate IPset files.
DOWNLOAD -
Prototype Software Assurance Framework (SAF): Introduction and Overview
• Technical Note
By Carol Woody , Christopher J. Alberts
In this report, the authors discuss the Software Assurance Framework (SAF), a collection of cybersecurity practices that programs can apply across the acquisition lifecycle and supply chain.
DOWNLOAD -
CERT pyfixbuf
• Software
By None
CERT pyfixbuf is a Python API for libfixbuf that can be used to write applications that collect and export IPFIX.
DOWNLOAD -
SEI CERT C and C++ Coding Standards
• None
By None
The CERT Secure Coding Team describes the root causes of common software vulnerabilities, how they can be exploited, the potential consequences, and secure alternatives.
DOWNLOAD -
CERT snarf
• Software
By None
CERT snarf is a distributed alert reporting system that sends send network alert messages.
DOWNLOAD -
PDFrankenstein
• Software
By None
PDFrankenstein is a Python tool for bulk malicious PDF feature extraction.
DOWNLOAD -
Insider Threat Test Dataset
• Dataset
By None
The Insider Threat Test Dataset is a collection of synthetic insider threat test datasets that provide both background and malicious actor synthetic data.
DOWNLOAD -
Automated Assurance of Security Policy Enforcement (AASPE)
• Software
By None
AASPE is a set of modeling tools for security analysis and a code generator to produce code for the seL4 platform from AADL models.
DOWNLOAD -
CERT Resilience Management Model: A Maturity Model for Managing Operational Resilience
• Book
By David W. White , Julia H. Allen , Richard A. Caralli
In this book, the authors present best practices for managing the security and survivability of people, information, technology, and facilities.
DOWNLOAD -
SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition)
• CERT Research Report
By None
In this online download, the CERT Secure Coding Team describes the root causes of common software vulnerabilities, how they can be exploited, the potential consequences, and secure alternatives.
DOWNLOAD -
Report Writer and Security Requirements Finder: User and Admin Manuals
• Special Report
By Nancy R. Mead , Anand Sankalp (Carnegie Mellon University) , Gupta Anurag (Carnegie Mellon) , Priyam Swati (Carnegie Mellon University) , Yaobin Wen (Carnegie Mellon University) , Walid El Baroni (Carnegie Mellon University)
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
DOWNLOAD -
Error Model Version 2
• Software
By None
The Error Model Annex, Version 2 (EMV2), notation for architecture fault modeling supports safety, reliability, and security analyses as part of the OSATE toolset.
DOWNLOAD -
CERT Resilience Management Model (CERT-RMM) Version 1.2
• Handbook
By None
CERT-RMM, the foundation for a process improvement approach to operational resilience management, defines the practices needed to manage operational resilience.
DOWNLOAD -
CERT netsa-python
• Software
By None
The netsa-python library is a collection of Python routines and frameworks to use when developing analyses using the SiLK toolkit.
DOWNLOAD -
CERT iSiLK
• Software
By None
iSiLK is a graphical front-end for the SiLK tools, designed to work with an existing installation of the SiLK analysis suite.
DOWNLOAD -
CERT Orcus
• Software
By None
Orcus is a system for analyzing passively-collected DNS information. It includes a capability for analyzing all DNS information that has been seen (the “resource record database”), as well as a …
DOWNLOAD -
KD-Cloudlet
• Software
By None
Cloudlets are discoverable, generic, stateless servers located in single-hop proximity of mobile devices that can operate in disconnected mode and are virtual-machine based.
DOWNLOAD -
Rosecheckers
• Software
By None
Rosecheckers is a tool that performs static analysis on C/C++ source files to enforce the rules in the CERT C Coding Standard.
DOWNLOAD -
Architecture Analysis and Design Language (AADL) Tool
• Software
By None
AADL provides a framework for analyzing system designs and supports architecture-centric, model-based development through the system lifecycle.
DOWNLOAD -
CERT Dranzer
• Software
By None
Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls.
DOWNLOAD -
GDB 'Exploitable' Plugin
• Software
By Jonathan Foote
The GDB 'exploitable' plugin can be used to assist software vendors and analysts in identifying the impact of defects.
DOWNLOAD -
CERT Prism
• Software
By None
Prism is a tool for visualizing flow data as a time series, broken down into several configurable bins by SiLK's rwfilter tool.
DOWNLOAD -
Introduction to the Security Engineering Risk Analysis (SERA) Framework
• Technical Note
By Carol Woody , Christopher J. Alberts , Audrey J. Dorofee
This report introduces the SERA Framework, a model-based approach for analyzing complex security risks in software-reliant systems and systems of systems early in the lifecycle.
DOWNLOAD -
Compiler-Enforced Buffer Overflow Elimination
• Software
By None
This tool prevents buffer overflows from succeeding in multithreaded code using static and dynamic analysis.
DOWNLOAD -
CERT Stix2Cif
• Software
By None
CERT Stix2Cif parses STIX/Cybox documents into JSON CIF feed files with corresponding configuration files and feeds them to CIF.
DOWNLOAD -
CERT Triage Tools
• Software
By None
CERT Triage Tools consist of a triage script and a GNU Debugger (GDB) extension named 'exploitable' that classify Linux application defects by severity.
DOWNLOAD -
CERT Cif2Stix
• Software
By None
CERT Cif2Stix is a plug-in for CIF that takes JSON object or file inputs and outputs STIX/CyBox documents.
DOWNLOAD -
CERT Rayon
• Software
By None
CERT Rayon is a Python library and set of tools that generates basic two-dimensional statistical visualizations.
DOWNLOAD -
Controls Systems Code Samples Download
• Software
By None
The Controls Systems Code Samples help an organization protect text-based intellectual property, including source code repositories.
DOWNLOAD -
SQUARE Instructional Materials
• Educational Material
By None
SQUARE instructional materials are designed for teaching the SQUARE method.
DOWNLOAD -
Introduction to the Mission Thread Workshop
• Technical Report
By Timothy Morrow , Michael J. Gagliardi , William Wood
This report introduces the Mission Thread Workshop, a method for understanding architectural and engineering considerations for developing and sustaining systems of systems. It describes the three phases of the workshop …
DOWNLOAD -
CERT JIRA Plugins
• Software
By None
CERT JIRA Plugins consist of Automated Task Creator, Email Attachment Handler, and Common Code.
DOWNLOAD -
SMART Materials
• Educational Material
By None
SMART materials help organizations make better decisions on their paths to adopting a service-oriented architecture.
DOWNLOAD -
A Framework for Software Product Line Practice, Version 5.0
• White Paper
By Felix Bachmann , Paul C. Clements , Gary Chastek , John K. Bergey , Robert W. Krut, Jr. , Patrick Donohoe , Sholom G. Cohen , Reed Little , Linda M. Northrop , John McGregor , Lawrence G. Jones , Liam O'Brien
This document describes the activities and practices in which an organization must be competent before it can benefit from fielding a product line of software systems.
DOWNLOAD -
Secure Coding Validation Suite
• Software
By None
The Secure Coding Validation Suite is a tool that performs a set of tests to validate the rules defined in ISO Technical Specification 17961.
DOWNLOAD -
Source Code Analysis Laboratory (SCALe)
• Technical Note
By Will Dormann , David Svoboda , Robert W. Stoddard , Robert C. Seacord , James McCurley , Jefferson Welch , Philip Miller
In this report, the authors describe the CERT Program's Source Code Analysis Laboratory (SCALe), a conformance test against secure coding standards.
DOWNLOAD -
Mission Risk Diagnostic (MRD) Method Description
• Technical Note
By Audrey J. Dorofee , Christopher J. Alberts
In this report, the authors describe the Mission Risk Diagnostic (MRD) method, which is used to assess risk in systems across the lifecycle and supply chain.
DOWNLOAD -
Smart Grid Maturity Model Assets Collection (SGMM), Version 1.2
• None
By None
These are the assets related to version 1.2 of the Smart Grid Maturity Model.
DOWNLOAD -
CERT SQUARE for Privacy (P-SQUARE)
• Software
By None
P-SQUARE was designed for stakeholders, requirements engineers, and administrators and supports the security and privacy aspects of SQUARE.
DOWNLOAD -
CERT SQUARE for Acquisition (A-SQUARE)
• Software
By None
SQUARE-A is designed for stakeholders, requirements engineers, and contractors/vendors to use in acquisitions and provides documentation support for a variety of use cases.
DOWNLOAD -
Measurement and Analysis Infrastructure Diagnostic, Version 1.0: Method Definition Document
• Technical Report
By Mark Kasunic
This 2010 report is a guidebook for conducting a Measurement and Analysis Infrastructure Diagnostic (MAID) evaluation.
DOWNLOAD -
As-If Infinitely Ranged Integer Model, Second Edition
• Technical Note
By Will Dormann , Robert C. Seacord , David Keaton , David Svoboda , Thomas Plum (Plum Hall, Inc.) , Alex Volkovitsky , Timothy Wilson , Roger Dannenberg (School of Computer Science, Carnegie Mellon University)
In this report, the authors present the as-if infinitely ranged (AIR) integer model, a mechanism for eliminating integral exceptional conditions.
DOWNLOAD -
Measurement and Analysis Infrastructure Diagnostic (MAID) Evaluation Criteria, Version 1.0
• Technical Report
By Software Engineering Measurement and Analysis (SEMA) Group
This 2009 report presents the criteria used during a MAID evaluation that serve as a checklist to rate the quality of an organization's measurement and analysis practices and the quality …
DOWNLOAD -
SMART: Analyzing the Reuse Potential of Legacy Components in a Service-Oriented Architecture Environment
• Technical Note
By Dennis B. Smith , Soumya Simanta , Edwin J. Morris , Grace Lewis
Is legacy system migration feasible for your organization as a means of SOA adoption? The Service Migration and Reuse Technique (SMART) assists an organization in determining what to migrate, the …
DOWNLOAD -
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process
• Technical Report
By William R. Wilson , James F. Stevens , Richard A. Caralli , Lisa R. Young
In this 2007 report, the authors highlight the design considerations and requirements for OCTAVE Allegro based on field experience.
DOWNLOAD -
Attribute-Driven Design (ADD), Version 2.0
• Technical Report
By Len Bass , Robert Wojcik , Paul C. Clements , Felix Bachmann , Robert Nord , William Wood , Paulo Merson
This report revises the steps of the Attribute-Driven Design (ADD) method and offers practical guidelines for carrying out each step.
DOWNLOAD -
Acquisition Strategy Development Tool
• Software
By None
The Acquisition Strategy Development Tool is a customized Excel workbook that helps acquisition planners work through their method and techniques.
DOWNLOAD -
Views and Beyond Documentation Template
• Educational Material
By None
A Microsoft Word template for a software architecture document is available for free download.
DOWNLOAD -
Quality Attribute Workshops (QAWs), Third Edition
• Technical Report
By William Wood , Charles Weinstock , Judith A. Stafford , Robert J. Ellison , Anthony J. Lattanze , Mario R. Barbacci
This report describes the newly revised QAW (Quality Attribute Workshop) and describes potential uses of the refined scenarios generated during it.
DOWNLOAD -
Identifying Commercial Off-the-Shelf (COTS) Product Risks: The COTS Usage Risk Evaluation
• Technical Report
By David J. Carney , Patrick R. Place , Edwin J. Morris
This 2003 report describes the development of an approach to reduce the number of program failures attributable to COTS software: the COTS Usage Risk Evaluation (CURE).
DOWNLOAD -
Active Reviews for Intermediate Designs
• Technical Note
By Paul C. Clements
This 2000 technical note describes Active Review for Intermediate Designs (ARID), a piloted software design review technique.
DOWNLOAD -
ATAM: Method for Architecture Evaluation
• Technical Report
By Paul C. Clements , Rick Kazman , Mark H. Klein
This report presents technical and organizational foundations for performing architectural analysis, and presents the SEI's ATAM, a technique for analyzing software architectures.
DOWNLOAD -
Goal-Driven Software Measurement: A Guidebook
• Handbook
By Robert E. Park
The materials in this 1996 guidebook are designed to help you identify, select, define, and implement software measures to support your business goals.
DOWNLOAD