NoobieDog / TPM-Sniffing
A repo for TPM sniffing greatness
☆222Updated 4 months ago
Alternatives and similar repositories for TPM-Sniffing:
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
- A list of public attacks on BitLocker☆275Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆27Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 4 months ago
- Wireless Hacking Devices Protocol client☆162Updated this week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Wireshark RDP resources☆211Updated 2 months ago
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- ☆301Updated 5 months ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆123Updated 8 months ago
- ☆66Updated 2 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆178Updated last week
- ☆147Updated last year
- ☆186Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆217Updated 4 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆150Updated 3 weeks ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆277Updated 8 months ago
- ☆203Updated 5 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆142Updated 7 months ago
- WMI virus, because funny☆278Updated 2 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆298Updated 3 years ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆323Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆290Updated last year
- A framework for creating smart cards (ICC-based cards with contacts).☆132Updated 8 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- Python tool to check rootkits in Windows kernel☆195Updated last month
- ☆298Updated 5 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- ☆311Updated 3 weeks ago