Hardware Security Validation Environment Logo

Hardware Security Validation Environment

0
Free
Visit Website

This repository contains tools and documentation for validating hardware configuration of an x86 platform, especially focusing on security requirements. The tools provided can be used to build a bootable USB key with modes for checking platform configuration registers using chipsec tool and inspecting/modifying SecureBoot key list with keytool.efi binary. Detailed documentation on the tested modules and security-related CPU options is available in the provided folders.

FEATURES

ALTERNATIVES

An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.

Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.

An open-source project for dynamic analysis of Android applications using the Android Substrate framework.

NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.

A cross-platform software library for interacting with iOS devices without jailbreaking.

A set of tools for securing JavaScript projects against software supply chain attacks.

Repository for apps to be used in Shuffle with compatibility instructions.

Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security