nsacyber / Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆788Updated last month
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance:
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
- A collection of sources of indicators of compromise.☆835Updated 4 months ago
- Awesome Firmware Security & Other Helpful Documents☆590Updated 5 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,759Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,259Updated 3 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,041Updated 3 years ago
- Platform Security Assessment Framework☆2,986Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆184Updated this week
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆266Updated 5 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,139Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,011Updated 3 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,563Updated 2 years ago
- Online hash checker for Virustotal and other services☆820Updated 9 months ago
- An Active Defense and EDR software to empower Blue Teams☆1,254Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆157Updated 9 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,850Updated 3 weeks ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆566Updated last week
- Security Research from the Microsoft Security Response Center (MSRC)☆1,338Updated 6 months ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,088Updated last week
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆860Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆497Updated 9 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,095Updated 2 months ago
- a tool to analyze filesystem images for security☆498Updated last year
- Guidance for mitigation web shells. #nsacyber☆972Updated last year
- SIFT☆500Updated last year
- Volatility plugins developed and maintained by the community☆354Updated 3 years ago
- FAME Automates Malware Evaluation☆878Updated this week
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,002Updated 4 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆398Updated 2 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago