Azure / Project-CerberusLinks
☆64Updated 2 months ago
Alternatives and similar repositories for Project-Cerberus
Users that are interested in Project-Cerberus are comparing it to the libraries listed below
Sorting:
- Security and Privacy Research at Microsoft☆46Updated last year
- Tutorials from TPM.dev members☆117Updated 3 months ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆379Updated 9 months ago
- Hardware Root of Trust☆26Updated last year
- Converged Security Suite for Intel & AMD platform security features☆68Updated this week
- Robust Internet of Things, Microsoft Research☆90Updated 2 years ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆298Updated last week
- An open source implementation of an AMD-V Secure Loader.☆27Updated 4 years ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆256Updated this week
- A tool to help you understand TPM commands and responses.☆47Updated last year
- A tool for parsing common ACPI tables☆15Updated 5 years ago
- ☆17Updated 2 years ago
- Security Project☆99Updated last week
- ☆17Updated 2 years ago
- ☆55Updated 3 weeks ago
- Linux Security Hardening for Confidential Compute☆69Updated last year
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆68Updated 5 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆31Updated last week
- TPM 2.0 Simulator Extraction Script☆50Updated 8 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 7 months ago
- ☆32Updated 5 years ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆33Updated 8 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- TCTI module for use with TSS2 libraries in UEFI environment☆37Updated last year
- ☆33Updated 8 years ago
- Security payload for next-Gen firmware architecture☆59Updated 7 months ago
- The Hedron Microhypervisor☆80Updated 2 years ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago