kkamagui / bitleakerLinks
This tool can decrypt a BitLocker-locked partition with the TPM vulnerability
☆218Updated 3 years ago
Alternatives and similar repositories for bitleaker
Users that are interested in bitleaker are comparing it to the libraries listed below
Sorting:
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆170Updated 5 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆107Updated 3 years ago
- ☆82Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆35Updated last month
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆145Updated 4 years ago
- A list of public attacks on BitLocker☆405Updated 4 months ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆240Updated 9 years ago
- ☆150Updated last year
- Machine-learn password mangling rules☆114Updated 2 years ago
- Decompile of the Solorwinds "SUNBURST" Trojan associated with Campaign UNC2452 This is the SolarWinds.Orion.Core.BusinessLayer.dll file f…☆44Updated 5 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- ☆134Updated 6 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆161Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆393Updated 6 months ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- PCAP visualization tool☆104Updated 2 years ago
- A repo for TPM sniffing greatness☆243Updated this week
- Qubes containerization on Windows☆130Updated 4 years ago
- ☆54Updated 2 years ago
- A fast and secure multi protocol honeypot.☆325Updated 3 years ago
- ☆95Updated 3 years ago
- This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs f…☆99Updated this week
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆453Updated 2 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆398Updated 5 years ago