NationalSecurityAgency / maatLinks
Maat is a centralized software integrity measurement and attestation (M&A) service
☆31Updated last year
Alternatives and similar repositories for maat
Users that are interested in maat are comparing it to the libraries listed below
Sorting:
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- OWASP Ontology-driven Threat Modelling framework☆40Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆84Updated last week
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Database☆22Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Updated last month
- ☆30Updated 2 months ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆17Updated last month
- Structured Threat Intelligence Graph☆97Updated last month
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆41Updated 3 weeks ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆52Updated last week
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Updated 3 years ago
- ☆99Updated last year
- Formal specification of attestation mechanisms in Confidential Computing☆24Updated 3 weeks ago
- DARPA's Automated Rapid Certification of Software (ARCOS) project called Rapid Assurance Curation Kit (RACK)☆21Updated 7 months ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated last year
- Device Identifier Composition Engine☆17Updated 3 years ago
- Rust implementation of the keylime agent☆144Updated this week
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 8 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated 2 weeks ago
- ☆56Updated 11 months ago
- Static code analysis of refpolicy style SELinux policy☆46Updated 8 months ago
- Linux kernel - See Landlock issues☆43Updated 7 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- A specification including, problem statement, use cases, requirements, and architectural constituents for a Transparency Service in suppo…☆14Updated 2 years ago
- Global Security Database Tools☆43Updated 2 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Updated last year
- PQC Transition Tools Index☆35Updated last month