nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆827Updated 8 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆605Updated 6 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,364Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,820Updated 3 weeks ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆199Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,191Updated last week
- DRAKVUF Black-box Binary Analysis☆1,151Updated 2 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,044Updated 4 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- ☆561Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆785Updated 10 months ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆628Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,186Updated 3 weeks ago
- Platform Security Assessment Framework☆3,104Updated this week
- a tool to analyze filesystem images for security☆504Updated last year
- A curated list of awesome Security Hardening techniques for Windows.☆1,787Updated 5 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆283Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,990Updated 2 weeks ago
- Distributed malware processing framework based on Python, Redis and S3.☆437Updated this week
- Fuzzy hashing API and fuzzy hashing tool☆739Updated 4 years ago
- FAME Automates Malware Evaluation☆908Updated 2 weeks ago
- A not so awesome list of malware gems for aspiring malware analysts☆822Updated 2 years ago
- Rekall Memory Forensic Framework☆1,970Updated 4 years ago
- A collection of sources of indicators of compromise.☆903Updated 3 months ago
- Security, hacking conferences (list)☆530Updated 2 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆916Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,575Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,674Updated last year
- High Octane Triage Analysis☆766Updated this week