NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆234Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆319Updated 2 weeks ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 2 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆262Updated 8 months ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆83Updated 3 weeks ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆304Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆172Updated 5 months ago
- Wireshark RDP resources☆216Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆248Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆376Updated last week
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆140Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- ☆75Updated 3 years ago
- Offensive Lua.☆193Updated last year
- ☆68Updated 6 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- WMI virus, because funny☆292Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Wireless Hacking Devices Protocol client☆222Updated this week
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆45Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆130Updated this week
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated last month
- ☆188Updated last year
- Bitpixie exploitation PoC☆52Updated last month
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- ☆133Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆186Updated 5 months ago
- ☆152Updated 4 months ago
- A repository of credential stealer formats☆223Updated 2 months ago