A tool to help you understand TPM commands and responses.
☆48Dec 3, 2024Updated last year
Alternatives and similar repositories for tpmstream
Users that are interested in tpmstream are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Apr 5, 2025Updated last year
- ☆11Sep 23, 2025Updated 6 months ago
- TPM 2.0 TSS keyfile library☆20Feb 28, 2026Updated last month
- The official repository for EEMBC's SecureMark™-TLS cryptography benchmark.☆19Feb 4, 2023Updated 3 years ago
- Clone of https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/ with patches for yubikey support☆10Aug 14, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Platform software for Trusted Computing - TPM 2.0, Certificate Authority, and Web Services required to perform Local and Remote Attestati…☆20Apr 7, 2025Updated last year
- SSH Certificate Authority with device attestation☆61Aug 31, 2024Updated last year
- Docker image for TPM 2.0 development from TPM.dev☆14Sep 5, 2023Updated 2 years ago
- The Parsec Command Line Interface☆14May 31, 2024Updated last year
- AEAD encryption using Trusted Platform Module (TPM)☆12Jan 5, 2026Updated 3 months ago
- Python bindings for TSS☆83Feb 22, 2026Updated last month
- Simple to use GUI tool for Infineon OPTIGA TPM 2.0☆26Feb 7, 2026Updated 2 months ago
- ☆20Nov 16, 2024Updated last year
- A FIDO Device Onboard library with minimal dependencies☆30Mar 16, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 8 months ago
- TCG Trusted Platform Module☆54Feb 11, 2026Updated 2 months ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆14Oct 2, 2025Updated 6 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Apr 4, 2019Updated 7 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 3 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆58Apr 3, 2026Updated last week
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Oct 30, 2016Updated 9 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Various client examples for getting TLS certificates from a Smallstep CA server☆20Mar 24, 2025Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- ssh-agent for TPMs☆598Apr 2, 2026Updated last week
- ☆57Oct 10, 2025Updated 6 months ago
- TPM 2.0 Simulator Extraction Script☆51Oct 15, 2017Updated 8 years ago
- A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols☆15May 14, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Skips build/evaluation based on modification date of nix files.☆22Jul 26, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Apr 18, 2024Updated last year
- F5 Service Password Decryption☆29Jul 31, 2025Updated 8 months ago
- ☆11Apr 7, 2022Updated 4 years ago