NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆241Updated last week
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆403Updated 5 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆270Updated last year
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆37Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated 2 years ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆114Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- ☆72Updated 11 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- ☆82Updated 3 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 3 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆259Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.☆44Updated 3 months ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆150Updated 4 months ago
- Bitpixie exploitation PoC☆89Updated 2 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated 11 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆192Updated 2 months ago
- Generate backdoored RSA keys using SETUP☆226Updated last month
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- This is practice VM for malware development☆174Updated 2 months ago
- WMI virus, because funny☆298Updated 11 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆75Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Direct access to NTFS volumes☆293Updated 4 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆151Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated 2 years ago
- Wireshark RDP resources☆221Updated 7 months ago