Azure / Project-Cerberus
☆58Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Project-Cerberus
- Security and Privacy Research at Microsoft☆38Updated 2 months ago
- A tool for parsing common ACPI tables☆14Updated 4 years ago
- Tutorials from TPM.dev members☆94Updated 4 months ago
- TCTI module for use with TSS2 libraries in UEFI environment☆32Updated last week
- ☆114Updated this week
- Robust Internet of Things, Microsoft Research☆81Updated last year
- TPM 2.0 Simulator Extraction Script☆47Updated 7 years ago
- Hardware Root of Trust☆20Updated last year
- An open source implementation of an AMD-V Secure Loader.☆23Updated 3 years ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆342Updated last month
- ☆31Updated 7 years ago
- ☆22Updated last week
- ☆32Updated this week
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆248Updated this week
- Linux Security Hardening for Confidential Compute☆66Updated last month
- A Test and Debug Tool for BMC AHB Interfaces☆50Updated this week
- Secure boot objects recommended by Microsoft.☆35Updated last week
- Converged Security Suite for Intel & AMD platform security features☆59Updated 3 months ago
- Checks for tpm vulnerabilities☆36Updated last year
- The RTOS components for the CHERIoT research platform☆131Updated this week
- ☆16Updated last year
- TPM 2.0 tools running in EFI environment☆23Updated 6 years ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆220Updated last week
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆116Updated 4 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆92Updated 7 years ago
- Infineon Embedded Linux TPM Toolbox 2 (ELTT2) for TPM 2.0☆85Updated 2 years ago
- mirror of https://chromium.googlesource.com/chromiumos/platform/depthcharge/☆21Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆182Updated this week
- EDK II new feature staging☆153Updated last month