google / amt-forensicsLinks
Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.
☆49Updated 4 years ago
Alternatives and similar repositories for amt-forensics
Users that are interested in amt-forensics are comparing it to the libraries listed below
Sorting:
- Mass DNS resolution tool☆37Updated 4 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated 2 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Packet-o-matic NG !☆64Updated 4 months ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 6 years ago
- apbleed☆24Updated 11 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Updated 9 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- Cable modem firmware dump☆41Updated 10 years ago
- ☆33Updated 13 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- ☆55Updated 9 months ago
- A honeypot for malware that propagates via USB storage devices☆99Updated 10 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year