Azure / Project-CerberusLinks
☆64Updated 3 weeks ago
Alternatives and similar repositories for Project-Cerberus
Users that are interested in Project-Cerberus are comparing it to the libraries listed below
Sorting:
- Security and Privacy Research at Microsoft☆46Updated last year
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆385Updated 10 months ago
- Tutorials from TPM.dev members☆122Updated 4 months ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆305Updated last week
- Converged Security Suite for Intel & AMD platform security features☆71Updated 2 weeks ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆262Updated last week
- Hardware Root of Trust☆24Updated last year
- Robust Internet of Things, Microsoft Research☆91Updated 2 years ago
- ☆55Updated last week
- A tool to help you understand TPM commands and responses.☆47Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 9 months ago
- ☆113Updated 2 years ago
- Security Project☆104Updated this week
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Updated 10 months ago
- TPM 2.0 Simulator Extraction Script☆51Updated 8 years ago
- An open source implementation of an AMD-V Secure Loader.☆27Updated 4 years ago
- A tool for parsing common ACPI tables☆15Updated 5 years ago
- ☆17Updated 2 years ago
- TRRespass☆127Updated 4 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆32Updated last month
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆115Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Updated last year
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆123Updated 3 months ago
- ☆182Updated last year
- TCTI module for use with TSS2 libraries in UEFI environment☆38Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- DMTF's Reference Implementation of SPDM☆165Updated last week
- TPM 2.0 tools running in EFI environment☆23Updated 7 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆69Updated 5 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆102Updated 8 years ago