nsacyber / Hardware-and-Firmware-Security-GuidanceView external linksLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆846Dec 23, 2024Updated last year
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆205Updated this week
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆164May 2, 2024Updated last year
- Guidance for mitigation web shells. #nsacyber☆982Jun 18, 2023Updated 2 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆289Aug 17, 2024Updated last year
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆406Dec 8, 2022Updated 3 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,592Dec 24, 2022Updated 3 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆1,066Feb 2, 2026Updated 2 weeks ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Dec 9, 2021Updated 4 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- Platform Security Assessment Framework☆3,180Updated this week
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆354Nov 3, 2023Updated 2 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,230Dec 12, 2022Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- Awesome Firmware Security & Other Helpful Documents☆612Jul 24, 2019Updated 6 years ago
- UEFI and SMM Assessment Tool☆213Nov 21, 2024Updated last year
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Updated this week
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆232Oct 31, 2025Updated 3 months ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆201Nov 25, 2016Updated 9 years ago
- a tool to analyze filesystem images for security☆511Oct 8, 2023Updated 2 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Dec 22, 2023Updated 2 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆881Nov 17, 2020Updated 5 years ago
- A collection of links related to Linux kernel security and exploitation☆6,346Jan 26, 2026Updated 3 weeks ago
- A collection of awesome security hardening guides, tools and other resources☆6,113Jan 20, 2026Updated 3 weeks ago
- Ghidra utilities for analyzing PC firmware☆466Jan 14, 2026Updated last month
- EMBA - The firmware security analyzer☆3,365Feb 10, 2026Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,311Dec 6, 2025Updated 2 months ago
- Red Teaming Tactics and Techniques☆4,487Aug 22, 2024Updated last year
- Security Research from the Microsoft Security Response Center (MSRC)☆1,377Aug 8, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,123Feb 10, 2026Updated last week
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆45Jul 19, 2021Updated 4 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,895Oct 20, 2025Updated 3 months ago
- Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.☆3,074Aug 10, 2025Updated 6 months ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- OT security monitoring #nsacyber☆614Jan 7, 2024Updated 2 years ago
- HardeningKitty and Windows Hardening Settings☆2,589Jan 24, 2026Updated 3 weeks ago