Foxboron / ssh-tpm-agentLinks
ssh-agent for TPMs
☆466Updated last month
Alternatives and similar repositories for ssh-tpm-agent
Users that are interested in ssh-tpm-agent are comparing it to the libraries listed below
Sorting:
- YubiKey plugin for age☆723Updated 6 months ago
- A WebAuthn/U2F token protected by a TPM (Go/Linux)☆345Updated last year
- FIDO2 (WebAuthn) and FIDO U2F platform library for Linux written in Rust☆433Updated this week
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆133Updated last week
- SSH Certificate Authority with device attestation☆55Updated 11 months ago
- Remote sudo authenticated via ssh-agent☆137Updated last month
- TPM 2.0 plugin for age☆96Updated this week
- Age based repository file encryption gitops tool☆307Updated 3 weeks ago
- Systemd Hardening Helper - Automatic systemd service hardening guided by strace profiling☆94Updated last week
- 🦠 NVMe-TCP at your fingertips 🦠☆308Updated 5 months ago
- A collection of projects and resources in the age file encryption ecosystem.☆445Updated 2 weeks ago
- A tool to detect when your YubiKey is waiting for a touch (to send notification or display a visual indicator on the screen)☆471Updated last week
- Tang binding daemon☆589Updated 4 months ago
- ☆416Updated 2 weeks ago
- A fork of password-store (https://www.passwordstore.org) that uses age (https://age-encryption.org) as backend.☆947Updated 11 months ago
- A secrets management service that uses Tailscale for access control☆322Updated last week
- Age plugin to encrypt files with fido2 tokens using the hmac-secret extension and non-discoverable credentials.☆66Updated last month
- Zero config TLS proxy server that uses SNI☆150Updated 2 weeks ago
- A reverse proxy that exposes services on your tailnet (as their own tailscale participants)☆234Updated this week
- Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing.☆40Updated 2 months ago
- ☆458Updated last week
- Automated Encryption Framework☆1,072Updated last week
- Progressively image a mounted disk correctly without corruption☆311Updated 3 years ago
- Attest the trustworthiness of a device against a human using time-based one-time passwords☆176Updated last year
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆246Updated this week
- Go implementation of FOKS -- client and server☆326Updated this week
- Virter is a command line tool for simple creation and cloning of virtual machines based on libvirt☆262Updated last week
- Fast and secure initramfs generator☆579Updated 3 weeks ago
- Stateless NAT64 (CLAT) implemented in eBPF☆27Updated last year
- TLS key escrow/interception for debugging☆257Updated last year