google / amt-forensics
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆50Updated 2 years ago
Related projects: ⓘ
- An EFI image parser and dissector☆50Updated 11 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- ☆29Updated 5 years ago
- ☆94Updated this week
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Updated 7 years ago
- ☆38Updated this week
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 7 years ago
- JEFF file format tools☆27Updated 8 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆12Updated 7 years ago
- ☆12Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆18Updated 6 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆30Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆31Updated 6 months ago
- Vulnerability Reports by Aleph Research☆34Updated 6 months ago
- Armadito module for PDF document analysis.☆18Updated 7 years ago
- ☆71Updated 6 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 6 years ago
- Set of helper utilitites for UEFI BIOS Updater project☆27Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 9 years ago
- ☆20Updated 5 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆60Updated 7 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆77Updated 4 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆38Updated 10 years ago
- Packet-o-matic NG !☆64Updated last month
- an experimental tool for forensic analysis of ExFAT filesystem☆15Updated 8 years ago