nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆809Updated 5 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆595Updated 5 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,357Updated 9 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆189Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,777Updated this week
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Rekall Memory Forensic Framework☆1,951Updated 4 years ago
- A collection of sources of indicators of compromise.☆867Updated 3 weeks ago
- a tool to analyze filesystem images for security☆502Updated last year
- FAME Automates Malware Evaluation☆898Updated last month
- AVML - Acquire Volatile Memory for Linux☆949Updated this week
- Platform Security Assessment Framework☆3,044Updated this week
- Digital Forensics artifact repository☆1,118Updated 5 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,819Updated 2 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,156Updated last month
- The multi-platform memory acquisition tool.☆797Updated 6 months ago
- ReversingLabs YARA Rules☆816Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,139Updated this week
- A VBA parser and emulation engine to analyze malicious macros.☆1,092Updated 10 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- Online hash checker for Virustotal and other services☆825Updated 2 months ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,773Updated 5 years ago
- yarGen is a generator for YARA rules☆1,647Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,279Updated 4 months ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,568Updated 2 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,601Updated last year
- A tool for checking the security hardening options of the Linux kernel☆1,878Updated 3 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,634Updated last week
- ☆560Updated 2 years ago
- Fuzzy hashing API and fuzzy hashing tool☆722Updated 4 years ago