☆16Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for secGear
Users that are interested in secGear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jan 16, 2020Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Linux kernel source tree☆44Jan 21, 2026Updated 2 months ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Nov 19, 2019Updated 6 years ago
- OpenSSL library for SGX application☆22Jun 20, 2022Updated 3 years ago
- My Unofficial Specification of the Oracle Database Wire Protocol.☆15May 26, 2022Updated 3 years ago
- Some simple LLVM Pass examples☆15Aug 7, 2022Updated 3 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- A fast, efficient on-disk/in-memory database with many different kind of data structures.☆27Oct 25, 2014Updated 11 years ago
- A collection of command-line tools based on Dyninst☆18Jun 3, 2021Updated 4 years ago
- ☆41Jan 5, 2026Updated 3 months ago
- ☆22Mar 27, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tennis Ball Speed Estimation using a Racket-mounted Motion Sensor☆13Feb 25, 2019Updated 7 years ago
- The Cryspen HACL Distribution☆19Apr 20, 2025Updated 11 months ago
- Library for the Zotero API☆16Jan 15, 2024Updated 2 years ago
- Lightweight window manager for emacs☆12Aug 17, 2015Updated 10 years ago
- KafeDB: End-to-End Structurally-Encrypted Database System. Based on Apache Spark SQL.☆12Nov 11, 2021Updated 4 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- OBSOLETE: Standardized way of making distributed backups of some secret using Shamir secret sharing technique☆12Aug 3, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆27Aug 28, 2024Updated last year
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Oct 20, 2020Updated 5 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- Sth in Control-Flow Integrity☆20Dec 25, 2018Updated 7 years ago
- An XML/JSON RPC library for C++11☆21Sep 13, 2015Updated 10 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Common protocol for generating ZK proofs for blocks on different blockchains.☆10Feb 9, 2024Updated 2 years ago
- AcWing y总的SpringBoot框架课,由于课程比较早,框架变化比较大,这是最新框架版本~☆22Jun 14, 2024Updated last year
- Implementation of the SPDM protocol☆13Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automatic inline image toggling as the cursor enters and exits them☆17Apr 18, 2023Updated 2 years ago
- ☆21Oct 9, 2020Updated 5 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- 基于铜锁密码库开发的商用密码工具箱桌面应用程序☆13Feb 5, 2025Updated last year
- Compositional Verification of Composite Byzantine Protocols☆13Aug 24, 2024Updated last year
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- ESP32 ROM blob to ELF convertor☆22May 9, 2018Updated 7 years ago