NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆232Updated last month
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆318Updated 5 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆262Updated 7 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆301Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆81Updated last week
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆164Updated 4 months ago
- Wireless Hacking Devices Protocol client☆216Updated this week
- A delicious, but malicious SSL-VPN server 🌮☆241Updated this week
- ☆67Updated 6 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 6 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 11 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- ☆75Updated 3 years ago
- ☆17Updated 8 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆43Updated last year
- WMI virus, because funny☆290Updated 6 months ago
- Offensive Lua.☆191Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated last month
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆129Updated last year
- Wireshark RDP resources☆215Updated 2 months ago
- ☆123Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆206Updated last month
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆138Updated last year
- Windows And Ways To Break It☆100Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆77Updated 2 months ago
- ☆151Updated 3 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year