DEITYBOUNCE once of several exploits targeting Dell PowerEdge servers.
IRONCHEF, which has been used against popular HP servers, requires physical access to the data centre first.
How the NSA attacks popular firewalls.
"For Huawei firewall".
"For Cisco firewalls".
"For Juniper firewalls".
"For select Huawei routers".
IRATEMONK is a tool that provides the NSA a way in to most standard hard drives.
SWAP, also covered in Applebaum's presentation, gains access to host-protected areas of a hard drive.
The original COTTONMOUTH exploit looked like a regular USB cable.
This slide shows the evolution of the COTTONMOUTH exploit.
SOMBREKNAVE targets air-gapped Windows XP machines.
The imaginatively named CANDYGRAM was the NSA's "digital tripwire", alerting operatives whenever a target entered the service radius of an owned mobile base station.
MONKEYCALENDAR targets SIM cards using over the air attacks.
DROPOUTJEEP was the first generation of NSA attack targeting iPhones - but required physical access to the device first. More work appears underway.
This exploit targeted Windows Phone users.
PICASSO targeted Samsung phone users.
DEITYBOUNCE once of several exploits targeting Dell PowerEdge servers.