kkamagui / bitleakerLinks
This tool can decrypt a BitLocker-locked partition with the TPM vulnerability
☆206Updated 3 years ago
Alternatives and similar repositories for bitleaker
Users that are interested in bitleaker are comparing it to the libraries listed below
Sorting:
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆142Updated 3 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆230Updated 9 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆103Updated 3 years ago
- A list of public attacks on BitLocker☆313Updated 5 months ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- ☆74Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated last month
- ☆148Updated last year
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆94Updated 4 months ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- PCAP visualization tool☆103Updated 2 years ago
- coldboot-tools☆30Updated 5 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆67Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 2 months ago
- A repo for TPM sniffing greatness☆231Updated 2 weeks ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆259Updated 2 years ago
- An NTFS/FAT parser for digital forensics & incident response☆205Updated 8 months ago
- ☆51Updated 2 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆393Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year