nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆197Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆69Updated last week
- ⛔️ DEPRECATED☆38Updated 4 years ago
- ☆10Updated 4 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- File Access Policy Daemon☆222Updated this week
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 5 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆216Updated 4 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆479Updated this week
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 4 months ago
- Learn how to use your Trusted Platform Module (TPM)☆136Updated 5 years ago
- Tutorials from TPM.dev members☆112Updated last year
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- A software-defined security orchestration solution☆43Updated 4 years ago
- ☆395Updated this week
- Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.☆16Updated 8 years ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆241Updated 2 weeks ago
- Security and Privacy Research at Microsoft☆44Updated 11 months ago
- GitHub mirror of the Linux Kernel's audit repository☆153Updated last week
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- ☆60Updated 3 weeks ago
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆55Updated 8 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- ☆282Updated 2 years ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆32Updated 4 months ago
- GitHub mirror of the SELinux kernel repository☆156Updated last week
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- MSR Project Freta☆77Updated last year
- Robust Internet of Things, Microsoft Research☆88Updated 2 years ago