google / amt-forensicsLinks
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆49Updated 3 years ago
Alternatives and similar repositories for amt-forensics
Users that are interested in amt-forensics are comparing it to the libraries listed below
Sorting:
- A USB armory based USB sandbox☆21Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- apbleed☆24Updated 11 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Dragon Sandbox☆78Updated 12 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- ☆34Updated 13 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- ☆24Updated 10 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆57Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- AFF is an open and extensible file format to store disk images and associated metadata.☆88Updated 4 months ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆80Updated 5 years ago
- lte security☆41Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Utility to decompress Linux swsusp hibernation file.☆29Updated 3 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆135Updated 9 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago