NoobieDog / TPM-Sniffing
A repo for TPM sniffing greatness
☆224Updated 5 months ago
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆281Updated 3 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 5 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆367Updated 3 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆219Updated 5 months ago
- Wordlist to crack .zip-file password☆202Updated 2 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆28Updated 2 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- ☆301Updated 6 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆143Updated 8 months ago
- Wireshark RDP resources☆212Updated 3 months ago
- ☆187Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆279Updated 9 months ago
- ☆67Updated 3 months ago
- Wireless Hacking Devices Protocol client☆178Updated this week
- ☆318Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆296Updated 3 weeks ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆107Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆290Updated last year
- WMI virus, because funny☆282Updated 3 months ago
- ☆299Updated 6 months ago
- ☆147Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆300Updated 3 years ago
- ☆298Updated last month
- A repository of credential stealer formats☆214Updated last month
- ☆192Updated 7 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆247Updated last year
- Offensive Lua.☆184Updated last year