nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆817Updated 6 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆603Updated 5 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,793Updated 2 weeks ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,363Updated 11 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆280Updated 11 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆192Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,161Updated this week
- AVML - Acquire Volatile Memory for Linux☆963Updated last week
- Bootkit sample for firmware attack☆257Updated 7 months ago
- Platform Security Assessment Framework☆3,077Updated this week
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,571Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,279Updated last year
- DRAKVUF Black-box Binary Analysis☆1,135Updated last month
- Rekall Memory Forensic Framework☆1,962Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,044Updated 3 years ago
- Linux Kernel Runtime Guard☆466Updated 2 weeks ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆906Updated last year
- Distributed malware processing framework based on Python, Redis and S3.☆431Updated 3 weeks ago
- ☆561Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,289Updated 5 months ago
- ReversingLabs YARA Rules☆830Updated 2 weeks ago
- Online hash checker for Virustotal and other services☆831Updated 3 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,947Updated 3 months ago
- Fuzzy hashing API and fuzzy hashing tool☆736Updated 4 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆781Updated 8 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,291Updated 5 months ago
- Everything related to Linux Forensics☆702Updated 2 years ago
- a tool to analyze filesystem images for security☆502Updated last year
- My curated list of awesome links, resources and tools on infosec related topics☆1,120Updated 4 months ago
- RIDL test suite and exploits☆356Updated 5 years ago