Tool kit for building secure, scalable, and networked services on top of AWS Nitro Enclaves.
☆51Feb 27, 2026Updated this week
Alternatives and similar repositories for nitriding-daemon
Users that are interested in nitriding-daemon are comparing it to the libraries listed below
Sorting:
- This library provides the definition of the enclave image format (EIF) file used in AWS Nitro Enclaves.☆16Feb 2, 2026Updated last month
- Seismic REVM implements the Mercury Specification of the EVM: a shielded virtual machine that powers Seismic's blockchain☆12Updated this week
- Code for emailwallet.org. Decentralized, zk-proof based, privacy preserving email-based transactions on chain, token transfers to email a…☆11Jan 21, 2026Updated last month
- This Guidance shows how to deploy a secure, scalable, and cost-efficient blockchain key management solution for blockchain validation wor…☆21Feb 11, 2026Updated 3 weeks ago
- This provides a library for interacting with the Nitro Secure Module, which provides Nitro Enclaves with attestation capability.☆84Feb 11, 2026Updated 3 weeks ago
- This project builds the kernel, nsm driver and bootstrap process for AWS Nitro Enclaves.☆24Feb 24, 2025Updated last year
- Testing Ethereum reorgs in a private geth network☆30Jan 6, 2023Updated 3 years ago
- ☆29Feb 11, 2026Updated 3 weeks ago
- ☆40Jul 22, 2025Updated 7 months ago
- Anonymous rewards on StarkNet☆35Sep 9, 2021Updated 4 years ago
- ☆12Jun 30, 2025Updated 8 months ago
- Pure Java Llama2 inference with optional multi-GPU CUDA implementation☆13Sep 2, 2023Updated 2 years ago
- Secure personal genomics using cryptography☆11Oct 9, 2025Updated 4 months ago
- A simple multilateral escrow smart contract for ETH and ERC-20 tokens governed by Cobie.☆43Feb 24, 2026Updated last week
- Emojimon: a MUD tutorial☆37Jul 4, 2024Updated last year
- ☆17Jan 1, 2021Updated 5 years ago
- gitk in your terminal.☆15Mar 6, 2013Updated 12 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- MiMC hash function☆11Sep 30, 2020Updated 5 years ago
- This program will extract the messages from an Outlook Express (5.0 - 6.0) mailbox and convert it either to the standard mbox or the Outl…☆10Dec 8, 2025Updated 2 months ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- ☆13Oct 30, 2019Updated 6 years ago
- Computing with sed: a compiler from python to sed☆11May 24, 2019Updated 6 years ago
- A confidential VM running unmodified container images in AWS Nitro Enclaves☆12Jan 5, 2026Updated 2 months ago
- Repo Manifests for the Yocto Project Build System for reproducible TEE builds☆10Nov 26, 2025Updated 3 months ago
- ☆11Mar 26, 2018Updated 7 years ago
- Simple Java object layer for AWS databases (SimpleDB and DynamoDB)☆29Oct 5, 2012Updated 13 years ago
- Tool for signing and countersigning iXBRL or other XML files☆12Mar 3, 2023Updated 3 years ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- You have 48 minutes to build something incredible.☆13Mar 26, 2025Updated 11 months ago
- Implements an encryptable machine (shapeCPU Java)☆11Aug 26, 2015Updated 10 years ago
- Cooperative get-port implementation☆10Jul 10, 2022Updated 3 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- ☆40Nov 24, 2013Updated 12 years ago
- Good Riddance to EPID Pre-Deprecation Memorial Contest☆12Dec 22, 2023Updated 2 years ago
- Link system accounts to keys.☆12May 29, 2023Updated 2 years ago
- Confidential inference in enclave for OpenAI grant. Uses k3s and Triton☆15Mar 20, 2025Updated 11 months ago