fluffypony / macos-yubikey-lockLinks
Lock the screen on OS X when your YubiKey is removed
☆43Updated 3 years ago
Alternatives and similar repositories for macos-yubikey-lock
Users that are interested in macos-yubikey-lock are comparing it to the libraries listed below
Sorting:
- Guide to building a Linux or BSD router on the PC Engines APU platform☆175Updated 2 months ago
- Scripts to bootstrap internal Certificate Authorities (CAs) using Yubikeys☆81Updated 5 years ago
- DEPRECATED A Browser extension that lets you use your phone as a U2F/WebAuthN Authenticator for strong, unphishable 2FA.☆126Updated last year
- How to secure your Macbook with Yubikey and use it for SSH auth☆113Updated last year
- Bash script for setting or clearing touch requirements for # cryptographic operations the OpenPGP application on a YubiKey 4☆158Updated 4 years ago
- Verify and assert policy on YubiKey attestation certificates☆20Updated 2 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆73Updated 2 months ago
- yubihsm-shell and libyubihsm☆106Updated 3 weeks ago
- A Secure Enclave Token Driver Smartcard Extension☆59Updated 2 years ago
- Hardware-based SSH/GPG/age agent☆590Updated 6 months ago
- YubiKey Key Storage Module☆37Updated last year
- iOS SEP U2F☆78Updated 7 years ago
- How to use a Yubikey with OpenSSH without GPG☆157Updated 4 years ago
- Malware and other applications may install persistent keyboard "event taps" to intercept your keystrokes. ReiKey can scan, detect, and mo…☆331Updated 4 years ago
- Command line tool for the YubiKey PIV application☆330Updated this week
- YubiKey C low-level library (libyubikey)☆107Updated last year
- Fill in login forms using an OpenPGP-enabled smart card☆26Updated 6 years ago
- Tools for using PIV tokens (like Yubikeys) as an SSH agent, for encrypting data at rest, and more☆207Updated 2 months ago
- ssh-askpass for macOS☆205Updated 7 months ago
- An SSHCA that uses a standard Yubikey to issue new host and user certificates.☆44Updated 2 months ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆101Updated 2 years ago
- Zero-trust SSH CA☆29Updated 10 months ago
- Apple Content Cache Reverse Engineering☆135Updated 2 years ago
- Every OS X/ macOS white paper☆114Updated 5 years ago
- Detect Evil Maid Attacks☆306Updated 4 years ago
- Continuously monitor and record the content of the major platforms' root certificate stores.☆135Updated last month
- The OnlyKey Python Command-Line Utility is a command line tool targeted towards more advanced users. This can be used for configuration a…☆50Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- Functions, demo tools, and example data, for decrypting elements of 1Password for Teams ("Cloud 1Password") B5 database structure.☆34Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago