nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆810Updated 6 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆599Updated 5 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,359Updated 10 months ago
- a tool to analyze filesystem images for security☆502Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,788Updated 2 weeks ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,774Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,284Updated 5 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,668Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,151Updated this week
- Platform Security Assessment Framework☆3,058Updated this week
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Updated 3 years ago
- DRAKVUF Black-box Binary Analysis☆1,129Updated last week
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆279Updated 10 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,939Updated 2 months ago
- AVML - Acquire Volatile Memory for Linux☆955Updated this week
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆778Updated 6 months ago
- ReversingLabs YARA Rules☆823Updated 2 weeks ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆478Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,437Updated 9 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,160Updated 2 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,475Updated last week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆779Updated 7 months ago
- FAME Automates Malware Evaluation☆900Updated 2 months ago
- High Octane Triage Analysis☆740Updated this week
- Forensics artefact collection tool for systems running Microsoft Windows☆416Updated 3 months ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,318Updated 2 years ago
- RIDL test suite and exploits☆355Updated 5 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆600Updated this week
- Security, hacking conferences (list)☆527Updated this week