A repo for TPM sniffing greatness
☆248Feb 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆19Nov 16, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆45Feb 22, 2026Updated 2 weeks ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆568Mar 28, 2024Updated last year
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆388Jan 20, 2026Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆129Oct 4, 2024Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆673Apr 5, 2024Updated last year
- DLL proxying for lazy people☆202Dec 1, 2025Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆149Aug 26, 2024Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- ☆41Mar 12, 2025Updated 11 months ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- ☆168Feb 29, 2024Updated 2 years ago
- ☆189Jan 23, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A list of public attacks on BitLocker☆414Aug 9, 2025Updated 7 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆779Jan 26, 2026Updated last month
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆324Jan 17, 2024Updated 2 years ago
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago