nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆192Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated 3 weeks ago
- ⛔️ DEPRECATED☆37Updated 4 years ago
- ☆10Updated 2 months ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆188Updated this week
- File Access Policy Daemon☆219Updated last month
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆475Updated last week
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆106Updated 3 years ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 3 years ago
- Tutorials from TPM.dev members☆106Updated 11 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Python bindings for TSS☆70Updated 2 weeks ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆214Updated 4 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 4 years ago
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 3 months ago
- A software-defined security orchestration solution☆43Updated 3 years ago
- A tool to help you understand TPM commands and responses.☆45Updated 7 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆238Updated this week
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆64Updated 2 months ago
- QEMU with vTPM support☆30Updated 8 months ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- A C implementation of the KMIP specification.☆42Updated last year
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Learn how to use your Trusted Platform Module (TPM)☆137Updated 5 years ago
- ☆391Updated last week
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- Test tool for CTAP2 authenticators☆56Updated 2 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆31Updated last month
- CoRIM and CoMID manipulation library and CLI☆12Updated this week