nsacyber / Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆765Updated last year
Related projects: ⓘ
- Awesome Firmware Security & Other Helpful Documents☆582Updated 5 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆260Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,602Updated last week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,032Updated this week
- AVML - Acquire Volatile Memory for Linux☆850Updated this week
- Guidance for mitigation web shells. #nsacyber☆961Updated last year
- Platform Security Assessment Framework☆2,915Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆697Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,234Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,479Updated 3 weeks ago
- A collection of sources of indicators of compromise.☆784Updated 2 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆881Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,445Updated this week
- ReversingLabs YARA Rules☆744Updated last week
- Rekall Memory Forensic Framework☆1,916Updated 3 years ago
- Super timeline all the things☆1,700Updated this week
- Security Research from the Microsoft Security Response Center (MSRC)☆1,318Updated last month
- FAME Automates Malware Evaluation☆845Updated 2 weeks ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,101Updated 9 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,357Updated last week
- An Active Defense and EDR software to empower Blue Teams☆1,229Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,920Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,587Updated 5 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,763Updated 3 months ago
- Digital Forensics artifact repository☆1,041Updated last month
- A toolset to make a system look as if it was the victim of an APT attack☆2,441Updated last year
- Malware Configuration And Payload Extraction☆743Updated last year
- yarGen is a generator for YARA rules☆1,533Updated 3 months ago
- a tool to analyze filesystem images for security☆485Updated 11 months ago
- Security, hacking conferences (list)☆486Updated last month