NoobieDog / TPM-Sniffing
A repo for TPM sniffing greatness
☆214Updated 2 months ago
Alternatives and similar repositories for TPM-Sniffing:
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
- A list of public attacks on BitLocker☆258Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆252Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆204Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆23Updated last month
- Wireless Hacking Devices Protocol client☆146Updated last week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆361Updated 2 weeks ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆133Updated last year
- ☆184Updated last year
- ☆297Updated 3 months ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆54Updated 5 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆132Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆315Updated last year
- ☆123Updated last year
- ☆201Updated 3 months ago
- ☆296Updated 3 months ago
- Tools for interacting with authentication packages using their individual message protocols☆305Updated 2 weeks ago
- Offensive Lua.☆179Updated last year
- Wireshark RDP resources☆210Updated this week
- ☆146Updated 10 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- Tools for analyzing EDR agents☆219Updated 8 months ago
- ☆61Updated 2 weeks ago
- A comprehensive Hypervisor resources repo☆103Updated last week
- Python tool to check rootkits in Windows kernel☆190Updated 2 weeks ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆233Updated this week
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆121Updated 6 months ago