A repo for TPM sniffing greatness
☆251Feb 20, 2026Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆47Mar 7, 2026Updated 3 weeks ago
- ☆20Nov 16, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25May 23, 2022Updated 3 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆568Mar 28, 2024Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- A simple, very experimental TPM sniffer for LPC bus☆679Apr 5, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆12Aug 10, 2019Updated 6 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 6 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆391Jan 20, 2026Updated 2 months ago
- A list of public attacks on BitLocker☆417Aug 9, 2025Updated 7 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- ☆41Mar 12, 2025Updated last year
- FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit☆82Jan 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DLL proxying for lazy people☆203Dec 1, 2025Updated 3 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- Reverse shell that can bypass windows defender detection☆172Feb 3, 2024Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆150Aug 26, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated 2 months ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- ☆167Feb 29, 2024Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆130Nov 12, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆163Oct 25, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 2 months ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆149Mar 15, 2025Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year