NoobieDog / TPM-SniffingView external linksLinks
A repo for TPM sniffing greatness
☆246Jan 5, 2026Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆40Dec 4, 2025Updated 2 months ago
- ☆18Nov 16, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆55Dec 31, 2025Updated last month
- ☆35Dec 6, 2023Updated 2 years ago
- ☆567Mar 28, 2024Updated last year
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆387Jan 20, 2026Updated 3 weeks ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆670Apr 5, 2024Updated last year
- DLL proxying for lazy people☆198Dec 1, 2025Updated 2 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Aug 26, 2024Updated last year
- ☆41Mar 12, 2025Updated 11 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Nov 12, 2023Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- ☆168Feb 29, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- ☆189Jan 23, 2024Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- A list of public attacks on BitLocker☆410Aug 9, 2025Updated 6 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 3 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical access☆271Dec 8, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆321Jan 17, 2024Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆214Jan 18, 2025Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- Dump Linux keyrings☆23Jul 15, 2024Updated last year