nsacyber / Hardware-and-Firmware-Security-GuidanceLinks
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆830Updated 10 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
Sorting:
- Awesome Firmware Security & Other Helpful Documents☆607Updated 6 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,874Updated 3 weeks ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,372Updated last year
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆201Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,225Updated 2 weeks ago
- a tool to analyze filesystem images for security☆507Updated 2 years ago
- Fuzzy hashing API and fuzzy hashing tool☆757Updated 2 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,581Updated 2 years ago
- ☆561Updated 2 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,047Updated 4 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,791Updated 5 years ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆282Updated last year
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- Platform Security Assessment Framework☆3,144Updated this week
- A collection of sources of indicators of compromise.☆920Updated 6 months ago
- DRAKVUF Black-box Binary Analysis☆1,183Updated 2 weeks ago
- Rekall Memory Forensic Framework☆1,985Updated 5 years ago
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,893Updated last week
- Firmware Analysis and Comparison Tool☆1,389Updated 3 weeks ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆566Updated 3 months ago
- Security, hacking conferences (list)☆537Updated 2 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆296Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆649Updated this week
- My curated list of awesome links, resources and tools on infosec related topics☆1,138Updated 3 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆446Updated last month
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,047Updated last month
- ReversingLabs YARA Rules☆872Updated 2 weeks ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆915Updated last year