Wack0 / bitlocker-attacks
A list of public attacks on BitLocker
☆268Updated last month
Alternatives and similar repositories for bitlocker-attacks:
Users that are interested in bitlocker-attacks are comparing it to the libraries listed below
- A repo for TPM sniffing greatness☆219Updated 3 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆257Updated 3 months ago
- WMI virus, because funny☆271Updated last month
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆26Updated last week
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆318Updated last year
- ☆69Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆367Updated last month
- ☆147Updated last year
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆41Updated 5 years ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆146Updated 2 months ago
- ☆570Updated 4 months ago
- ☆204Updated 4 months ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆176Updated 10 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆136Updated last year
- Wireshark RDP resources☆210Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆215Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- ☆297Updated 4 months ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆333Updated this week
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆297Updated 3 years ago
- ☆297Updated 4 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆130Updated 10 months ago
- A tool that shows detailed information about named pipes in Windows☆617Updated 4 months ago
- Damn Vulnerable UEFI☆272Updated 6 months ago
- ☆122Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆139Updated 8 months ago
- ☆55Updated 5 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆269Updated 7 months ago
- Exploring RPC interfaces on Windows☆320Updated last year
- Python tool to check rootkits in Windows kernel☆195Updated 3 weeks ago