fluffypony / macos-yubikey-lock
Lock the screen on OS X when your YubiKey is removed
☆40Updated 2 years ago
Alternatives and similar repositories for macos-yubikey-lock:
Users that are interested in macos-yubikey-lock are comparing it to the libraries listed below
- An SSHCA that uses a standard Yubikey to issue new host and user certificates.☆43Updated 2 months ago
- Verify and assert policy on YubiKey attestation certificates☆20Updated last week
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated 2 weeks ago
- A shared library that implements a PKCS#11 interface to the Apple Security framework☆100Updated last year
- A Secure Enclave Token Driver Smartcard Extension☆56Updated 2 years ago
- Bash script for setting or clearing touch requirements for # cryptographic operations the OpenPGP application on a YubiKey 4☆158Updated 4 years ago
- Simple daemon for locking and unlocking macOS with Yubikey☆103Updated 4 years ago
- Determinstic backup and recovery of PGP keys using human-readable phrases.☆69Updated last year
- Fill in login forms using an OpenPGP-enabled smart card☆26Updated 6 years ago
- Command line program for secret-sharing strings☆75Updated 2 years ago
- Tor relay Docker images for x86-64, armhf & arm64 (from source)☆38Updated 2 years ago
- How to use a Yubikey with OpenSSH without GPG☆157Updated 4 years ago
- An SSH and GPG agent which you can use with your PIV hardware security device (e.g. a Yubikey).☆86Updated this week
- Scripts to bootstrap internal Certificate Authorities (CAs) using Yubikeys☆78Updated 5 years ago
- OpenPGP keys published on your website (WKD)☆51Updated last month
- ☆96Updated 4 months ago
- Experimental version of Algo built on Terraform☆73Updated this week
- iOS SEP U2F☆78Updated 7 years ago
- Tools for using PIV tokens (like Yubikeys) as an SSH agent, for encrypting data at rest, and more☆197Updated this week
- macOS XProtect definition files☆40Updated 2 years ago
- Chef cookbook for hardening macOS systems☆27Updated 7 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 3 years ago
- A document proposing the standardization of a model for warrant canaries to facilitate scalable adoption by enabling automated monitoring…☆72Updated 3 years ago
- How to secure your Macbook with Yubikey and use it for SSH auth☆110Updated last year
- Cost of missing the best days of returns in BTC☆5Updated 3 years ago
- Proof of concept tool to detect RandomX cryptojacking malware on Windows☆55Updated 3 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated last month
- YubiKey Key Storage Module☆36Updated last year
- Key management is hard☆126Updated 2 years ago
- yubihsm-shell and libyubihsm☆97Updated this week