nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆201Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆70Updated 2 months ago
- ⛔️ DEPRECATED☆37Updated 4 years ago
- ☆12Updated last month
- File Access Policy Daemon☆228Updated this week
- GitHub mirror of the Linux Kernel's audit repository☆155Updated last week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 6 months ago
- TPM 2.0 Simulator Extraction Script☆49Updated 8 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆221Updated 4 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆495Updated this week
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- The OVAL Language Schemas☆87Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- A software-defined security orchestration solution☆43Updated 4 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆68Updated 5 years ago
- Learn how to use your Trusted Platform Module (TPM)☆138Updated 5 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆830Updated 10 months ago
- GitHub mirror of the SELinux kernel repository☆157Updated 3 weeks ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆23Updated 3 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- ☆279Updated 2 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Updated 3 months ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆190Updated last week
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆56Updated 8 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- Tutorials from TPM.dev members☆115Updated 2 months ago
- MSR Project Freta☆77Updated last year
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 6 years ago