Wack0 / bitlocker-attacks
A list of public attacks on BitLocker
☆264Updated last week
Alternatives and similar repositories for bitlocker-attacks:
Users that are interested in bitlocker-attacks are comparing it to the libraries listed below
- A repo for TPM sniffing greatness☆214Updated 2 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆253Updated 2 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆291Updated 2 years ago
- ☆70Updated 2 years ago
- Damn Vulnerable UEFI☆266Updated 5 months ago
- ☆122Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆135Updated last month
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆315Updated last year
- Wireshark RDP resources☆210Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆205Updated 2 months ago
- ☆201Updated 3 months ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆331Updated last week
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆38Updated 5 years ago
- ☆568Updated 3 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated 10 months ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆172Updated 9 months ago
- Exploring RPC interfaces on Windows☆315Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆361Updated 3 weeks ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆164Updated 10 months ago
- Python tool to check rootkits in Windows kernel☆192Updated 2 weeks ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆93Updated 5 months ago
- ☆146Updated 10 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Bootkit sample for firmware attack☆245Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆23Updated 2 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆651Updated 3 months ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆487Updated 2 months ago