nsacyber / Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
☆800Updated 4 months ago
Alternatives and similar repositories for Hardware-and-Firmware-Security-Guidance:
Users that are interested in Hardware-and-Firmware-Security-Guidance are comparing it to the libraries listed below
- AVML - Acquire Volatile Memory for Linux☆938Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,149Updated last week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆574Updated last month
- Awesome Firmware Security & Other Helpful Documents☆593Updated 5 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,125Updated this week
- DRAKVUF Black-box Binary Analysis☆1,113Updated last week
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 11 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,895Updated 2 weeks ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,269Updated 3 months ago
- Malware Configuration And Payload Extraction☆754Updated 5 months ago
- ReversingLabs YARA Rules☆814Updated 2 weeks ago
- Indicators of Compromises (IOC) of our various investigations☆1,760Updated last week
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,152Updated 4 months ago
- Windows kernel and user mode emulation.☆1,636Updated 3 weeks ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,769Updated 5 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆415Updated 3 weeks ago
- Rekall Memory Forensic Framework☆1,949Updated 4 years ago
- Indicators from Unit 42 Public Reports☆711Updated this week
- Platform Security Assessment Framework☆3,020Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,570Updated last year
- awesome-linux-rootkits☆1,820Updated 3 months ago
- A collection of sources of indicators of compromise.☆850Updated 6 months ago
- Digital Forensics artifact repository☆1,109Updated 4 months ago
- Guidance for mitigation web shells. #nsacyber☆973Updated last year
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆961Updated 2 weeks ago
- Binee: binary emulation environment☆516Updated 2 years ago
- List of Awesome Advanced Windows Exploitation References☆1,484Updated 3 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,351Updated 8 months ago
- A static analyzer for PE executables.☆1,057Updated last year