libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automatically extracted.
☆25May 23, 2022Updated 3 years ago
Alternatives and similar repositories for libsigrokdecoder_spi-tpm
Users that are interested in libsigrokdecoder_spi-tpm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Nov 16, 2024Updated last year
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- UART proxy tool for inter-chip analysis.☆23Mar 14, 2025Updated last year
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- A high resolution spectrogram for viewing FSK signals in real time☆15Dec 19, 2021Updated 4 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Simple STM32F103 based glitcher FW☆36May 16, 2021Updated 4 years ago
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Feb 24, 2026Updated last month
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Freeconnect is a collection of In-circuit connectors with open source design files and documentation.☆13Jul 26, 2021Updated 4 years ago
- A repo for TPM sniffing greatness☆250Feb 20, 2026Updated last month
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Jun 30, 2021Updated 4 years ago
- ☆14Dec 24, 2024Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆155Oct 12, 2023Updated 2 years ago
- Implementation of CoAP Server & Client in Go by @Kistler-Group☆13Jun 22, 2021Updated 4 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆22Aug 13, 2018Updated 7 years ago
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆23Nov 21, 2021Updated 4 years ago
- Small script to use PIR sensor for motion estimation on motionEye☆12May 29, 2020Updated 5 years ago
- ☆24Feb 19, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/mac-osx-forensics☆28Jan 12, 2016Updated 10 years ago
- my phork of elkowar's phork of phocus.☆11Jul 11, 2022Updated 3 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Acer n35 tools for flashing ROM (eg. load Linux kernel into device)☆13Mar 30, 2011Updated 14 years ago
- SNI proxy with an option to relay traffic to a custom IP address when required☆14Jun 16, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆19May 27, 2025Updated 10 months ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- IDA plugin for auto rename symbol☆15Jan 16, 2025Updated last year
- This is a library for extended memory support on the Atmega2560 microcontroller.☆12Nov 26, 2013Updated 12 years ago
- A MagSpoof build using STM32☆14Jul 27, 2020Updated 5 years ago
- ☆15Mar 21, 2022Updated 4 years ago
- ☆16Sep 8, 2018Updated 7 years ago