stoeckmann / signify-windowsLinks
OpenBSD signify for Windows systems
☆7Updated 9 years ago
Alternatives and similar repositories for signify-windows
Users that are interested in signify-windows are comparing it to the libraries listed below
Sorting:
- A tool for downloading, checking, and applying (CVE) patches to a repository.☆49Updated 9 months ago
- Linux TPM Trusted Boot binary_bios_measurements file parser/reconstructor☆22Updated 4 years ago
- Liteqube - put Qubes OS on a diet☆57Updated 10 months ago
- TOoltip-poweRed Phishing Email DetectiOn☆16Updated last year
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- ☆35Updated 7 years ago
- AICDL collector services and modules☆45Updated 8 years ago
- ☆45Updated 6 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 6 years ago
- A backup application for the Android Open Source Project.☆21Updated 3 weeks ago
- ☆16Updated 4 years ago
- Hardened Android standard C library. Some of the past hardening has not yet been ported from Marshmallow, Nougat and Oreo to this Android…☆111Updated this week
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆15Updated 7 years ago
- ☆29Updated 6 years ago
- Qubes component: vmm-xen☆37Updated last week
- Qubes management API client☆38Updated this week
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Hardware project of the Nitrokey Storage device☆39Updated last year
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- A Tamarin model and analysis of EMV☆33Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 2 months ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Thunderbird plugin to warn users against potentially dangerous attachments☆8Updated 11 months ago
- USB armory Debian base image☆80Updated 3 months ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated 3 weeks ago
- USB armory - hardware control tool☆32Updated 4 months ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago