nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆832Updated 11 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆610Updated 6 years ago
- Platform Security Assessment Framework☆3,152Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- Security Research from the Microsoft Security Response Center (MSRC)☆1,373Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,890Updated last week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,248Updated this week
- ☆563Updated 2 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- a tool to analyze filesystem images for security☆507Updated 2 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- DRAKVUF Black-box Binary Analysis☆1,187Updated last month
- Fuzzy hashing API and fuzzy hashing tool☆766Updated 2 months ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,902Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,039Updated last month
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆285Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- AVML - Acquire Volatile Memory for Linux☆1,022Updated last week
- Rekall Memory Forensic Framework☆1,991Updated 5 years ago
- Firmware Analysis and Comparison Tool☆1,395Updated last week
- Security, hacking conferences (list)☆541Updated 2 weeks ago
- Linux Kernel Runtime Guard☆548Updated 2 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,206Updated 4 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆659Updated last week
- A collection of sources of indicators of compromise.☆931Updated 7 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,305Updated 10 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆925Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆240Updated 7 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆822Updated 2 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆900Updated 5 years ago
- Digital Forensics artifact repository☆1,184Updated 2 weeks ago