WithSecureLabs / bitlocker-spi-toolkit
Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.
☆283Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for bitlocker-spi-toolkit
- A low pin count sniffer for ICEStick - targeting TPM chips☆156Updated 4 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆186Updated 2 years ago
- A list of public attacks on BitLocker☆181Updated last year
- A repo for TPM sniffing greatness☆167Updated this week
- A U-Boot hacking toolkit for security researchers and tinkerers☆257Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆103Updated last year
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆270Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆240Updated 2 years ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆127Updated last year
- ☆67Updated 2 years ago
- Firmware Analysis Tool☆154Updated this week
- a low pin count sniffer for icestick☆90Updated 5 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated 3 months ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆155Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆19Updated last month
- Bootkit sample for firmware attack☆237Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆533Updated 7 months ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆211Updated 3 years ago
- Qubes containerization on Windows☆130Updated 3 years ago
- random dissectors☆68Updated last year
- Toolbox for HPE iLO4 & iLO5 analysis☆414Updated 9 months ago
- PCAP visualization tool☆101Updated last year
- Execute ELF files without dropping them on disk☆482Updated 4 months ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆503Updated 6 months ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆127Updated 7 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆227Updated 7 months ago
- Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.☆662Updated 10 months ago
- FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit☆76Updated 10 months ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆138Updated 4 years ago