en4rab / SPITkeyLinks
Decrypt the bitlocker FVEK for a bitlocker encrypted drive.
☆37Updated last month
Alternatives and similar repositories for SPITkey
Users that are interested in SPITkey are comparing it to the libraries listed below
Sorting:
- A repo for TPM sniffing greatness☆241Updated last week
- ☆82Updated 3 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- bitpixie Proof of Concept - Bitlocker Decryptor☆114Updated 3 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- ☆17Updated last year
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆44Updated 2 weeks ago
- A list of public attacks on BitLocker☆403Updated 5 months ago
- ☆131Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- Bitpixie exploitation PoC☆89Updated 2 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆46Updated 11 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆135Updated last year
- ☆181Updated 2 weeks ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Updated 3 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated this week
- Wireless Hacking Devices Protocol client☆275Updated this week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆192Updated 2 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆28Updated 4 years ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆219Updated 3 years ago
- random dissectors☆68Updated 2 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆167Updated 4 months ago
- Diana Credential Recovery Framework☆65Updated last week
- ☆55Updated last year
- An Open-Source Door Simulator for RFID/PACS Training☆136Updated last year