google / amt-forensicsLinks
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆49Updated 3 years ago
Alternatives and similar repositories for amt-forensics
Users that are interested in amt-forensics are comparing it to the libraries listed below
Sorting:
- A USB armory based USB sandbox☆21Updated 8 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆135Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Self-signed UEFI- and GRUB-based secure boot system for Ubuntu.☆23Updated 5 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Cable modem firmware dump☆41Updated 10 years ago
- ☆30Updated 10 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- ☆118Updated 4 years ago
- CLIP OS toolkit (cosmk)☆16Updated 3 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- ☆29Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- A honeypot for malware that propagates via USB storage devices☆100Updated 10 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆34Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago