NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆237Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆382Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆30Updated 4 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆266Updated 10 months ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆101Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆311Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆180Updated last week
- ☆70Updated 8 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated 3 weeks ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆147Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Wireless Hacking Devices Protocol client☆250Updated this week
- WMI virus, because funny☆296Updated 8 months ago
- ☆128Updated last year
- Offensive Lua.☆204Updated last week
- Direct access to NTFS volumes☆280Updated last month
- Wireshark RDP resources☆217Updated 4 months ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆255Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆269Updated 3 weeks ago
- ☆79Updated 3 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆61Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆88Updated last month
- ☆153Updated 6 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆69Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆266Updated 11 months ago
- ☆52Updated 2 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆136Updated last year