NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆231Updated 2 weeks ago
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆313Updated 5 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆261Updated 7 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆299Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆129Updated 11 months ago
- Wireless Hacking Devices Protocol client☆205Updated this week
- ☆67Updated 5 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆158Updated 3 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 5 months ago
- Wireshark RDP resources☆215Updated last month
- ☆123Updated last year
- Wordlist to crack .zip-file password☆203Updated 2 years ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆74Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 10 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆247Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆138Updated last year
- Offensive Lua.☆188Updated last year
- ☆74Updated 3 years ago
- ☆189Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆41Updated last year
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆197Updated 4 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated last week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆126Updated 5 months ago
- ☆49Updated last month