A list of public attacks on BitLocker
☆413Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for bitlocker-attacks
Users that are interested in bitlocker-attacks are comparing it to the libraries listed below
Sorting:
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25May 23, 2022Updated 3 years ago
- Bitpixie exploitation PoC☆94Oct 28, 2025Updated 4 months ago
- ☆190Nov 21, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- AppLocker-Based EDR Neutralization☆321Dec 19, 2025Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated last week
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Feb 2, 2026Updated 3 weeks ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- DPAPI looting remotely and locally in Python☆541Oct 7, 2025Updated 4 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 4 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆44Updated this week
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆302Sep 7, 2023Updated 2 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,040Jun 20, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆258Jun 29, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- A modern 32/64-bit position independent implant template☆1,293Mar 21, 2025Updated 11 months ago
- ☆615Feb 5, 2026Updated 3 weeks ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆318Mar 8, 2022Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- A repo for TPM sniffing greatness☆247Feb 20, 2026Updated last week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆676Dec 23, 2022Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,032Dec 31, 2025Updated 2 months ago
- ☆223Oct 22, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago