Maat is a centralized software integrity measurement and attestation (M&A) service
☆31Oct 21, 2024Updated last year
Alternatives and similar repositories for maat
Users that are interested in maat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- socat(1) fork with AF_VSOCK support. vsock support is now available with mainline socat 1.7.4 available at http://www.dest-unreach.…☆10Jan 31, 2020Updated 6 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- ☆16Feb 10, 2023Updated 3 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆17Oct 27, 2017Updated 8 years ago
- ☆12Dec 20, 2022Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- a minimalistic todo app☆10May 10, 2023Updated 2 years ago
- This project has been archived and is no longer maintained☆36Mar 25, 2013Updated 13 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Feb 3, 2025Updated last year
- ☆11Nov 30, 2020Updated 5 years ago
- A set of cog recipes for C++ reflection☆15Aug 21, 2011Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Binary Ninja plugin providing various niche utilities for working with PE binaries☆10Nov 30, 2023Updated 2 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆165May 2, 2024Updated last year
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- Info about tpm2-software☆21Nov 5, 2025Updated 4 months ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 9 months ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- scraped www.allitebooks.com and index all the books available.☆12Oct 1, 2020Updated 5 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- Python script that generates a HTML triage report of iOS notifications content.☆17Sep 19, 2019Updated 6 years ago
- ☆14Nov 23, 2023Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Remote attestation for Trusted and Confidential Computing platforms (TPM, AMD SEV-SNP, Intel SGX/TDX)☆21Mar 19, 2026Updated last week
- Scripts to use with the macOS Security Compliance Project☆21Jan 12, 2026Updated 2 months ago
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AVENS is part of a research project that aims to provide a simulation test bed for virtual experiments of network coverage and connectivi…☆13Dec 20, 2016Updated 9 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆208Updated this week
- ☆22Sep 6, 2016Updated 9 years ago
- OS X image build automation☆40Apr 9, 2022Updated 3 years ago
- force reinstall and remediation of broken Crowdstrike Falcon agents on macOS☆14Jun 17, 2022Updated 3 years ago
- FE-511 Bloomberg Terminal and Thomson Reuters☆12Feb 8, 2017Updated 9 years ago
- ☆40Mar 6, 2026Updated 2 weeks ago