NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆241Updated 2 weeks ago
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆396Updated 3 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆271Updated 11 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆33Updated this week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆321Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆110Updated 2 months ago
- ☆71Updated 10 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆312Updated 3 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆150Updated 3 months ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆385Updated 2 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆93Updated last month
- WMI virus, because funny☆299Updated 10 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆277Updated this week
- Wireshark RDP resources☆218Updated 6 months ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 2 months ago
- ☆130Updated 2 years ago
- Offensive Lua.☆216Updated 3 weeks ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆190Updated last month
- Wireless Hacking Devices Protocol client☆264Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆61Updated last year
- ☆81Updated 3 years ago
- Direct access to NTFS volumes☆287Updated 2 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- ☆17Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆73Updated last year
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 7 months ago