nsacyber / Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆787Updated last month
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance:
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
- DRAKVUF Black-box Binary Analysis☆1,084Updated 2 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆156Updated 8 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆182Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,719Updated last week
- Script for searching the extracted firmware file system for goodies!☆1,090Updated last year
- Awesome Firmware Security & Other Helpful Documents☆589Updated 5 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,135Updated last year
- Security Research from the Microsoft Security Response Center (MSRC)☆1,339Updated 5 months ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,562Updated 2 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,841Updated last week
- A curated list of awesome Security Hardening techniques for Windows.☆1,755Updated 5 years ago
- Platform Security Assessment Framework☆2,975Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,090Updated last month
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,838Updated last month
- Rekall Memory Forensic Framework☆1,934Updated 4 years ago
- ReversingLabs YARA Rules☆785Updated last week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,074Updated this week
- a tool to analyze filesystem images for security☆498Updated last year
- Security, hacking conferences (list)☆511Updated this week
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆266Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,394Updated this week
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,659Updated 11 months ago
- A collection of sources of indicators of compromise.☆832Updated 3 months ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,761Updated 3 months ago
- Digital Forensics artifact repository☆1,081Updated last month
- Firmware Analysis and Comparison Tool☆1,277Updated this week
- Encyclopedia for Executables☆427Updated 3 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,168Updated 4 years ago