Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆855Dec 23, 2024Updated last year
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆208Apr 2, 2026Updated last week
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆289Aug 17, 2024Updated last year
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆165May 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Guidance for mitigation web shells. #nsacyber☆980Jun 18, 2023Updated 2 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆407Dec 8, 2022Updated 3 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,593Dec 24, 2022Updated 3 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Dec 9, 2021Updated 4 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆114Feb 19, 2021Updated 5 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆1,086Apr 3, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,227Dec 12, 2022Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆45Jul 19, 2021Updated 4 years ago
- UEFI and SMM Assessment Tool☆215Nov 21, 2024Updated last year
- Platform Security Assessment Framework☆3,208Apr 3, 2026Updated last week
- Awesome Firmware Security & Other Helpful Documents☆616Jul 24, 2019Updated 6 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated last month
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆358Nov 3, 2023Updated 2 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆198Nov 25, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆236Oct 31, 2025Updated 5 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Jun 2, 2016Updated 9 years ago
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 7 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Dec 18, 2017Updated 8 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- a tool to analyze filesystem images for security☆513Oct 8, 2023Updated 2 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆102May 10, 2017Updated 8 years ago
- EMBA - The firmware security analyzer☆3,418Apr 2, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆147Dec 22, 2023Updated 2 years ago
- 👓A collection of papers/tools/exploits for UEFI security.☆215Sep 4, 2025Updated 7 months ago
- Ghidra utilities for analyzing PC firmware☆477Feb 16, 2026Updated last month
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,039Feb 24, 2020Updated 6 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,256Mar 20, 2026Updated 2 weeks ago
- Binarly Vulnerability Research Advisories☆184Mar 25, 2026Updated 2 weeks ago
- A collection of links related to Linux kernel security and exploitation☆6,392Mar 7, 2026Updated last month