latchset / crypto-auditing
Provides a way to monitor cryptographic operations performed on a system
☆14Updated 4 months ago
Alternatives and similar repositories for crypto-auditing:
Users that are interested in crypto-auditing are comparing it to the libraries listed below
- A collection of high-performance crypto implementations.☆47Updated last month
- Rewritten Clevis TPM2 PIN☆16Updated 10 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 11 months ago
- TPM 2.0 Implementation☆46Updated this week
- Linux kernel - See Landlock issues☆36Updated 2 months ago
- Administrative utility for SEV-SNP☆29Updated last week
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆57Updated this week
- Proof-of-Concept Linux kernel module to export kernel APIs over kernel device nodes☆25Updated 6 years ago
- Tool for generating non-trivial X.509 certificate chains☆29Updated last week
- A dynamic library bundling the guest payload consumed by libkrun☆85Updated last month
- A suite of testvectors for X.509 certificate path validation and tools for building them☆46Updated this week
- A network packet synthesis language☆27Updated last year
- ☆16Updated 2 years ago
- ☆94Updated 2 weeks ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆11Updated 2 years ago
- kdevops history tree - use new git tree☆46Updated 11 months ago
- A crate to find DWARF debug symbols from stripped binaries☆22Updated last year
- tar analysis tool☆21Updated 11 months ago
- THIS REPO IS UNMAINTAINED. Go to --> https://gitlab.com/nbdkit/libnbd☆37Updated last year
- Initial discussions on signatures of WebAssembly modules.☆16Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A determinizing tracer using Ptrace☆35Updated 4 years ago
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- A Rust library for using Linux devicemapper☆73Updated this week
- ☆21Updated last month
- A tool to help you understand TPM commands and responses.☆40Updated 3 months ago
- C-friendly API to make path resolution safer on Linux.☆88Updated this week
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year