Wack0 / bitlocker-attacksLinks
A list of public attacks on BitLocker
☆382Updated 2 months ago
Alternatives and similar repositories for bitlocker-attacks
Users that are interested in bitlocker-attacks are comparing it to the libraries listed below
Sorting:
- A repo for TPM sniffing greatness☆237Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆266Updated 10 months ago
- WMI virus, because funny☆296Updated 8 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆101Updated last month
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆180Updated this week
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆345Updated 2 years ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆683Updated last year
- A GUI and CLI tool for removing bloat from executables☆427Updated 3 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆30Updated 4 months ago
- Wireshark RDP resources☆217Updated 4 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆311Updated last year
- Comprehensive toolkit for Ghidra headless.☆362Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated 3 weeks ago
- ☆78Updated 3 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆212Updated last year
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆207Updated 2 months ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆143Updated last month
- Python tool to check rootkits in Windows kernel☆201Updated 2 months ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆52Updated 5 years ago
- Operating System Design Review: A systematic analysis of modern systems architecture☆328Updated 8 months ago
- A repository of credential stealer formats☆229Updated 4 months ago
- ☆70Updated 8 months ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆61Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 2 months ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆445Updated 6 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆269Updated 3 weeks ago
- Workshop on firmware reverse engineering☆313Updated last month