This repository contains tools and documentation for validating hardware configuration of an x86 platform, especially focusing on security requirements. The tools provided can be used to build a bootable USB key with modes for checking platform configuration registers using chipsec tool and inspecting/modifying SecureBoot key list with keytool.efi binary. Detailed documentation on the tested modules and security-related CPU options is available in the provided folders.
FEATURES
ALTERNATIVES
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
An open-source project for dynamic analysis of Android applications using the Android Substrate framework.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
A cross-platform software library for interacting with iOS devices without jailbreaking.
A set of tools for securing JavaScript projects against software supply chain attacks.
Repository for apps to be used in Shuffle with compatibility instructions.
Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.