A tool to help you understand TPM commands and responses.
☆48Dec 3, 2024Updated last year
Alternatives and similar repositories for tpmstream
Users that are interested in tpmstream are comparing it to the libraries listed below
Sorting:
- ☆11Sep 23, 2025Updated 5 months ago
- TPM 2.0 Implementation☆79Feb 12, 2026Updated 2 weeks ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Apr 5, 2025Updated 11 months ago
- SSH Certificate Authority with device attestation☆58Aug 31, 2024Updated last year
- A FIDO Device Onboard library with minimal dependencies☆30Feb 9, 2026Updated 3 weeks ago
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- Clone of https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/ with patches for yubikey support☆10Aug 14, 2020Updated 5 years ago
- AEAD encryption using Trusted Platform Module (TPM)☆12Jan 5, 2026Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- The official repository for EEMBC's SecureMark™-TLS cryptography benchmark.☆19Feb 4, 2023Updated 3 years ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- Docker image for TPM 2.0 development from TPM.dev☆14Sep 5, 2023Updated 2 years ago
- The Parsec Command Line Interface☆14May 31, 2024Updated last year
- Secure key management service for middle-box decryption of TLS traffic☆16Sep 4, 2024Updated last year
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Attestation verification services based on Veraison components☆42Updated this week
- Test suite which checks compliance with CAA checking as defined in version 1.4.8 of the CABF Baseline Requirements☆10Jul 16, 2024Updated last year
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- Go SCEP server☆42Mar 18, 2025Updated 11 months ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- State machine. Workflow engine☆26Dec 26, 2025Updated 2 months ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Checks whether a TLS connection uses SHA1 signed certificates, and if Google Chrome approves.☆17Jul 22, 2015Updated 10 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆14Oct 2, 2025Updated 5 months ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12May 16, 2016Updated 9 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Various client examples for getting TLS certificates from a Smallstep CA server☆21Mar 24, 2025Updated 11 months ago
- Network Cryptography Monitor - using eBPF, written in python☆42Aug 26, 2025Updated 6 months ago
- ☆19Nov 16, 2024Updated last year
- ☆18Mar 14, 2023Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Entity Attestation Token IETF Draft Standard☆20Apr 15, 2025Updated 10 months ago