joholl / tpmstreamLinks
A tool to help you understand TPM commands and responses.
☆45Updated 6 months ago
Alternatives and similar repositories for tpmstream
Users that are interested in tpmstream are comparing it to the libraries listed below
Sorting:
- Entity Attestation Token IETF Draft Standard☆18Updated 2 months ago
- Tutorials from TPM.dev members☆106Updated 11 months ago
- Converged Security Suite for Intel & AMD platform security features☆61Updated last month
- TPM 2.0 Implementation☆59Updated last month
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 3 months ago
- Administrative utility for SEV-SNP☆32Updated last week
- ☆10Updated 2 months ago
- OpenSSL Provider for TPM2 integration☆96Updated 4 months ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆52Updated last week
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆24Updated 2 years ago
- ☆26Updated last week
- A Linux only tool for TPM interaction☆36Updated 3 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆41Updated last year
- Go Trusted Execution Environment (TEE)☆126Updated 3 months ago
- Curated list of open-source TPM (Trusted Platform Module) applications☆24Updated 3 years ago
- Docker image for TPM 2.0 development from TPM.dev☆13Updated last year
- CoRIM and CoMID manipulation library and CLI☆11Updated this week
- PKCS#11 module for NetHSM☆39Updated last week
- Research tools developed for Intel Wi-Fi chips☆54Updated last week
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated 2 months ago
- Python bindings for TSS☆70Updated 3 weeks ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆19Updated last year
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆32Updated 2 months ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- A history of PGP-related vulnerabilities☆24Updated 3 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Device Identifier Composition Engine☆12Updated 3 years ago