nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆828Updated 10 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆605Updated 6 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,368Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,862Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,215Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆199Updated this week
- Platform Security Assessment Framework☆3,132Updated this week
- a tool to analyze filesystem images for security☆505Updated 2 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,790Updated 5 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- DRAKVUF Black-box Binary Analysis☆1,176Updated 3 weeks ago
- Security, hacking conferences (list)☆534Updated last month
- Linux Kernel Runtime Guard☆540Updated 2 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆825Updated 3 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,441Updated 2 months ago
- Firmware Analysis and Comparison Tool☆1,384Updated this week
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,878Updated 2 months ago
- A collection of sources of indicators of compromise.☆911Updated 5 months ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆280Updated last year
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,196Updated 2 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆823Updated 2 years ago
- A tool for checking the security hardening options of the Linux kernel☆1,972Updated this week
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- Rekall Memory Forensic Framework☆1,983Updated 5 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,015Updated last month
- Fuzzy hashing API and fuzzy hashing tool☆752Updated last month
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,273Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆920Updated last year
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆558Updated 2 months ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,129Updated 2 months ago