bartblaze / Disable-Intel-AMTLinks
Tool to disable Intel AMT on Windows
☆146Updated 8 years ago
Alternatives and similar repositories for Disable-Intel-AMT
Users that are interested in Disable-Intel-AMT are comparing it to the libraries listed below
Sorting:
- SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-20…☆584Updated 6 years ago
- Cisco Talos MBR Filter Driver☆344Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Decryption Tool☆147Updated 6 years ago
- A simple powershell script that removes a lot of Windows 10's more unnecessary, annoying, or invasive components.☆23Updated 9 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆255Updated 3 years ago
- Elevation by environment variable expansion☆64Updated 9 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- Cross-platform, open-source shellbag parser☆160Updated 3 years ago
- MS17-010 Windows SMB RCE -- Full subnet scanner☆24Updated 8 years ago
- Stop Windows 10 Nagging and Spying. Works with Windows 7 through 10☆27Updated 10 years ago
- Distributed wrapper around oclHashcat☆93Updated 10 months ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Updated 3 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- ☆70Updated 7 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- To block the malware domains of coin-hive systemwide.☆91Updated 6 years ago
- VirusTotal tools☆92Updated 5 years ago
- Hacking Team Malware Detection Utility☆42Updated 10 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Updated 9 years ago
- ☆298Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 10 years ago
- Fighting against ransomware using honeypots☆178Updated 4 years ago