google / amt-forensicsLinks
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆48Updated 4 years ago
Alternatives and similar repositories for amt-forensics
Users that are interested in amt-forensics are comparing it to the libraries listed below
Sorting:
- A USB armory based USB sandbox☆21Updated 8 years ago
- apbleed☆24Updated 11 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- disthc☆28Updated 11 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- CLIP OS toolkit (cosmk)☆16Updated 4 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Cable modem firmware dump☆41Updated 10 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- ☆33Updated 13 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- dcfldd - enhanced version of dd for forensics and security☆70Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆56Updated 11 months ago
- Passive SSL client fingerprinting using handshake analysis.☆113Updated 8 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- ☆25Updated 10 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated 2 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- A tool for parsing common ACPI tables☆15Updated 5 years ago
- ☆16Updated 9 years ago
- Packet-o-matic NG !☆64Updated 6 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago