kkamagui / napper-for-tpmView external linksLinks
TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019
☆106Jun 26, 2022Updated 3 years ago
Alternatives and similar repositories for napper-for-tpm
Users that are interested in napper-for-tpm are comparing it to the libraries listed below
Sorting:
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Jun 24, 2019Updated 6 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆47May 18, 2020Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- X41 Smartcard Fuzzer☆120Jan 15, 2019Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Nov 24, 2017Updated 8 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Mar 28, 2019Updated 6 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Various snippets created during malware analysis☆465Oct 3, 2025Updated 4 months ago
- ☆121Apr 1, 2018Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Aug 22, 2018Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- ☆25Aug 20, 2025Updated 5 months ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆222Aug 4, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Jun 5, 2018Updated 7 years ago
- Legacy version of libewf☆13Dec 20, 2025Updated last month
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago