CoRIM and CoMID manipulation library
☆22Mar 9, 2026Updated last week
Alternatives and similar repositories for corim
Users that are interested in corim are comparing it to the libraries listed below
Sorting:
- TPM 2.0 Implementation☆82Feb 12, 2026Updated last month
- Platform software for Trusted Computing - TPM 2.0, Certificate Authority, and Web Services required to perform Local and Remote Attestati…☆19Apr 7, 2025Updated 11 months ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- A guide on how to emulate an NVMe SPDM responder device with QEMU and Linux. Additionally, instructions on setting up and testing the (in…☆11Sep 3, 2024Updated last year
- Linux applications to manage, test and develop devices supporting DMTF Security Protocol and Data Model (SPDM)☆18Feb 6, 2026Updated last month
- Standardization of security reviews for datacenter products☆23Mar 13, 2026Updated last week
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆22Oct 25, 2023Updated 2 years ago
- A tiny tool for embedding CoSWID tags in EFI binaries☆26Mar 13, 2026Updated last week
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- Remote attestation for Trusted and Confidential Computing platforms (TPM, AMD SEV-SNP, Intel SGX/TDX)☆21Updated this week
- ☆22May 21, 2024Updated last year
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆23Mar 19, 2025Updated last year
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆29Jan 13, 2026Updated 2 months ago
- Attestation verification services based on Veraison components☆42Updated this week
- This is the main repository for the Cooja network simulator☆33Updated this week
- ☆15Jun 10, 2022Updated 3 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆208Updated this week
- A Linux only tool for TPM interaction☆36Mar 25, 2022Updated 3 years ago
- Python interface to the SGX SDK☆31Oct 25, 2018Updated 7 years ago
- go-tdx-guest offers a library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamenta…☆89Mar 5, 2026Updated 2 weeks ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆32Feb 12, 2026Updated last month
- ☆20Mar 3, 2026Updated 2 weeks ago
- Native go library for interacting with TPM 2.0 devices☆35Feb 25, 2026Updated 3 weeks ago
- Infineon OPTIGA™ TPM 2.0☆35Aug 6, 2024Updated last year
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Jan 3, 2023Updated 3 years ago
- simplified rust error handling☆10Mar 31, 2025Updated 11 months ago
- ☆17Apr 14, 2022Updated 3 years ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Apr 5, 2025Updated 11 months ago
- RISC-V Confidential VM Extension☆14Jan 14, 2026Updated 2 months ago
- Website for Research Artifacts from the Security Community☆31Mar 13, 2026Updated last week
- Nanolat Database supporting 1M transactions per second.☆23Apr 26, 2014Updated 11 years ago
- rust wrapper for libyubihsm☆15Feb 19, 2026Updated last month
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆17Aug 19, 2025Updated 7 months ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Feb 12, 2026Updated last month
- Alistair's fork of the Linux kernel source tree. Including sources for the mainline reMarkable 2 kernel development, sunxi patches and ot…☆11Mar 12, 2026Updated last week
- twitter bot☆13Jan 26, 2015Updated 11 years ago
- OpenSSL Provider for TPM2 integration☆119Mar 8, 2026Updated last week
- Server-side SDK to provide a simple REST API for distribution of security information.☆17May 11, 2016Updated 9 years ago