The Chrome plugin for SafeKeeper password protection service.
☆12Apr 25, 2018Updated 7 years ago
Alternatives and similar repositories for safekeeper-chrome
Users that are interested in safekeeper-chrome are comparing it to the libraries listed below
Sorting:
- The server part of the SafeKeeper project.☆18Jul 12, 2018Updated 7 years ago
- Maat is a centralized software integrity measurement and attestation (M&A) service☆31Oct 21, 2024Updated last year
- socat(1) fork with AF_VSOCK support. vsock support is now available with mainline socat 1.7.4 available at http://www.dest-unreach.…☆10Jan 31, 2020Updated 6 years ago
- Atomix Jepsen tests☆14Feb 7, 2017Updated 9 years ago
- Interface adapter for the LeapMotion to make it easier to work with inside of THREE.JS☆19Mar 16, 2014Updated 12 years ago
- ☆11Aug 28, 2024Updated last year
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- IPython extension for rendering and displaying asymptote in an IPython notebook.☆41Nov 7, 2019Updated 6 years ago
- Libraries for accessing data from Omron medical devices☆17Jan 16, 2012Updated 14 years ago
- Container building stuff☆16Mar 3, 2026Updated 2 weeks ago
- ☆12Dec 20, 2022Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Joystick visualizer optimized for use as an overlay element while streaming or recording.☆12Dec 12, 2025Updated 3 months ago
- MultiZone® Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure acce…☆20Jan 22, 2024Updated 2 years ago
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- CoRIM and CoMID manipulation library☆22Mar 9, 2026Updated last week
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Nov 22, 2025Updated 4 months ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- Project to build and test seL4 for many different platforms☆17Updated this week
- Info about tpm2-software☆21Nov 5, 2025Updated 4 months ago
- Bachelor's Graduation Project. Using the Microsoft Kinect to reconstruct 3D faces as avatars.☆16Jul 16, 2016Updated 9 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Sep 2, 2023Updated 2 years ago
- the longene tech-docs for translation, to-be used in wiki: http://www.longene.org/mediawiki/index.php/%E9%A6%96%E9%A1%B5☆13Jan 4, 2011Updated 15 years ago