NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆234Updated last week
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆331Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆263Updated 9 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 3 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆311Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆98Updated 2 weeks ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated this week
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- ☆70Updated 8 months ago
- ☆128Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated last week
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆177Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Wireless Hacking Devices Protocol client☆237Updated this week
- Wordlist to crack .zip-file password☆205Updated 3 years ago
- Wireshark RDP resources☆216Updated 4 months ago
- Workshop on firmware reverse engineering☆182Updated last week
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆147Updated last year
- ☆78Updated 3 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆254Updated last year
- WMI virus, because funny☆293Updated 8 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆62Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆265Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Offensive Lua.☆195Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆343Updated 2 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆140Updated last month
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆50Updated last year
- ☆189Updated last year