NationalSecurityAgency / maat
Maat is a centralized software integrity measurement and attestation (M&A) service
☆26Updated last month
Related projects ⓘ
Alternatives and complementary repositories for maat
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 6 months ago
- Exploit, Malware and Vulnerability Scoring Application☆10Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated 3 weeks ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆31Updated last week
- ☆21Updated this week
- OWASP Ontology-driven Threat Modelling framework☆36Updated last year
- Static code analysis of refpolicy style SELinux policy☆38Updated 3 weeks ago
- Securing open-source package ecosystems by originating, validating, and augmenting build attestations.☆32Updated this week
- The public release of LeftoverLocals code☆64Updated 10 months ago
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Database☆20Updated last year
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 4 years ago
- ☆30Updated 6 months ago
- phenix is an orchestration tool and GUI for Sandia's minimega platform☆19Updated last month
- Making transparency normal!☆24Updated 11 months ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆60Updated this week
- MSR Project Freta☆76Updated 4 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆182Updated this week
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- Structured Threat Intelligence Graph☆87Updated 3 weeks ago
- ☆19Updated 4 years ago
- Manage, monitor and improve your cyber security posture.☆87Updated last year
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆21Updated 3 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 7 years ago
- ☆25Updated last year
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated 5 months ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆17Updated last month
- Linux Security Hardening for Confidential Compute☆66Updated last month
- Posture Attribute Collection and Evaluation☆23Updated last year
- Legacy firmware for ICS and other devices.☆11Updated 3 years ago