nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆827Updated 9 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆605Updated 6 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,364Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,848Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆199Updated this week
- AVML - Acquire Volatile Memory for Linux☆992Updated this week
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,204Updated last week
- ReversingLabs YARA Rules☆851Updated last month
- DRAKVUF Black-box Binary Analysis☆1,166Updated 2 weeks ago
- A collection of sources of indicators of compromise.☆907Updated 4 months ago
- A tool for checking the security hardening options of the Linux kernel☆1,957Updated last week
- Platform Security Assessment Framework☆3,119Updated this week
- ☆561Updated 2 years ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,870Updated last month
- Fuzzy hashing API and fuzzy hashing tool☆746Updated 2 weeks ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆914Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Updated 4 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆284Updated last year
- SIFT☆517Updated last year
- Digital Forensics artifact repository☆1,159Updated 2 weeks ago
- Security, hacking conferences (list)☆531Updated last week
- Firmware Analysis and Comparison Tool☆1,377Updated this week
- Online hash checker for Virustotal and other services☆835Updated 6 months ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆786Updated 11 months ago
- Rekall Memory Forensic Framework☆1,973Updated 4 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆633Updated this week
- Everything related to Linux Forensics☆707Updated 2 years ago
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆738Updated 4 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,220Updated 9 months ago
- a tool to analyze filesystem images for security☆505Updated last year