NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆230Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆309Updated 4 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 6 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆156Updated 3 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆299Updated last year
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 2 weeks ago
- Wordlist to crack .zip-file password☆203Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆258Updated 3 weeks ago
- WMI virus, because funny☆282Updated 4 months ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆329Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆233Updated last week
- ☆204Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated 9 months ago
- ☆123Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 9 months ago
- ☆189Updated last year
- Wireless Hacking Devices Protocol client☆195Updated this week
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- ☆67Updated 4 months ago
- ☆303Updated 7 months ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆69Updated last week
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year
- ☆148Updated last year
- Windows And Ways To Break It☆100Updated last year
- Wireshark RDP resources☆213Updated 3 weeks ago
- Offensive Lua.☆188Updated last year
- Lab used for workshop and CTF☆250Updated last month
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- VSS Hardware Hacking Wiki and Blog Entries☆247Updated last year
- Python tool to check rootkits in Windows kernel☆197Updated 3 months ago