kkamagui / bitleaker
This tool can decrypt a BitLocker-locked partition with the TPM vulnerability
☆189Updated 2 years ago
Alternatives and similar repositories for bitleaker:
Users that are interested in bitleaker are comparing it to the libraries listed below
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆102Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆292Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆26Updated 2 months ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆139Updated 3 years ago
- ☆146Updated 9 months ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆162Updated 4 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆226Updated 8 years ago
- ☆378Updated last week
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated 11 months ago
- An open source swiss army knife for arbitrary communication over application protocols☆239Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆185Updated 4 years ago
- ☆479Updated 7 years ago
- Extract APFS hashes☆33Updated 4 years ago
- Decompile of the Solorwinds "SUNBURST" Trojan associated with Campaign UNC2452 This is the SolarWinds.Orion.Core.BusinessLayer.dll file f…☆44Updated 4 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆422Updated 10 months ago
- An NTFS/FAT parser for digital forensics & incident response☆199Updated 4 months ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆103Updated 4 years ago
- A list of public attacks on BitLocker☆266Updated last month
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- A repo for TPM sniffing greatness☆216Updated 3 months ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆300Updated 9 months ago
- coldboot-tools☆30Updated 4 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- Automatically exported from code.google.com/p/creddump☆249Updated 5 years ago
- ☆92Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆95Updated this week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆230Updated last year