google / amt-forensicsLinks
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆49Updated 3 years ago
Alternatives and similar repositories for amt-forensics
Users that are interested in amt-forensics are comparing it to the libraries listed below
Sorting:
- Firmware analysis gone wild.☆42Updated 10 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆32Updated 7 years ago
- An EFI image parser and dissector☆51Updated 12 years ago
- JEFF file format tools☆27Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆29Updated 6 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- ☆34Updated 7 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Intel Management Engine firmware loader plugin for IDA☆92Updated 7 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆13Updated 9 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Updated 7 years ago
- ☆24Updated 9 years ago
- ☆12Updated 8 years ago
- ☆74Updated 7 years ago
- Automatically exported from code.google.com/p/timing-attestation☆13Updated 9 years ago
- Library and tools to access the Extended File System☆18Updated 5 months ago
- Dragon Sandbox☆79Updated 12 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- kCFI Documentation☆14Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 11 months ago
- ☆32Updated last year