NoobieDog / TPM-SniffingLinks
A repo for TPM sniffing greatness
☆227Updated 2 weeks ago
Alternatives and similar repositories for TPM-Sniffing
Users that are interested in TPM-Sniffing are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆304Updated 3 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 5 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 2 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆369Updated 4 months ago
- A delicious, but malicious SSL-VPN server 🌮☆227Updated 6 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆303Updated 3 years ago
- ☆188Updated last year
- ☆68Updated 4 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆60Updated last week
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆288Updated 9 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆154Updated 2 months ago
- Windows And Ways To Break It☆100Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆143Updated 9 months ago
- ☆147Updated last year
- ☆131Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- A ProcessMonitor visualization application written in rust.☆180Updated last year
- ☆191Updated 8 months ago
- ☆123Updated last year
- Wireshark RDP resources☆212Updated this week
- ☆303Updated 6 months ago
- Collection of codes focused on Linux rootkits☆110Updated 3 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆59Updated 9 months ago
- ☆17Updated 6 months ago
- Lab used for workshop and CTF☆239Updated last week
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆175Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago