NationalSecurityAgency / maat
Maat is a centralized software integrity measurement and attestation (M&A) service
☆26Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for maat
- Development of the NIST vulnerability data ontology (Vulntology).☆36Updated 5 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated 2 weeks ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆19Updated 2 years ago
- Structured Threat Intelligence Graph☆87Updated last week
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆33Updated 3 weeks ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆16Updated last year
- Posture Attribute Collection and Evaluation☆23Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 6 months ago
- OWASP Ontology-driven Threat Modelling framework☆36Updated last year
- Static code analysis of refpolicy style SELinux policy☆38Updated 2 weeks ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆29Updated last year
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆14Updated 2 months ago
- Formal specification of attestation mechanisms in Confidential Computing☆14Updated 2 months ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆21Updated 3 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆181Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆42Updated 2 months ago
- ☆19Updated 4 years ago
- CVE.ICU code.☆34Updated this week
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆31Updated this week
- ☆30Updated 6 months ago
- a RTE-free X.509 parser☆58Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆66Updated this week
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆25Updated 6 months ago
- Global Security Database Tools☆41Updated 11 months ago
- Picatrix is a library designed to help security analysts in a notebook environment, such as colab or jupyter.☆48Updated 4 months ago
- A tiny tool for embedding CoSWID tags in EFI binaries☆20Updated this week
- extractor for QNX6 filesystem format.☆21Updated 11 months ago
- A specification including, problem statement, use cases, requirements, and architectural constituents for a Transparency Service in suppo…☆14Updated last year
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Updated 3 years ago