nsacyber / Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆796Updated 3 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance:
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
- Security Research from the Microsoft Security Response Center (MSRC)☆1,344Updated 7 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆569Updated last week
- Indicators of Compromises (IOC) of our various investigations☆1,745Updated last week
- Awesome Firmware Security & Other Helpful Documents☆592Updated 5 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,039Updated 3 years ago
- A collection of sources of indicators of compromise.☆841Updated 5 months ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆271Updated 7 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,111Updated last week
- AVML - Acquire Volatile Memory for Linux☆925Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,878Updated 2 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,143Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,739Updated this week
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,180Updated 4 years ago
- DRAKVUF Black-box Binary Analysis☆1,100Updated last week
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆773Updated 5 months ago
- Digital Forensics artifact repository☆1,094Updated 3 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- a tool to analyze filesystem images for security☆499Updated last year
- Rekall Memory Forensic Framework☆1,945Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,266Updated 2 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆744Updated 3 months ago
- CLI tool to manage a SIFT Install☆419Updated 2 years ago
- yarGen is a generator for YARA rules☆1,621Updated 9 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,134Updated 3 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆906Updated last year
- Online hash checker for Virustotal and other services☆822Updated last week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆184Updated this week
- Fuzzy hashing API and fuzzy hashing tool☆708Updated 4 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,131Updated last month
- FAME Automates Malware Evaluation☆882Updated last month