nsacyber / Detect-CVE-2017-15361-TPM
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
☆55Updated 6 years ago
Alternatives and similar repositories for Detect-CVE-2017-15361-TPM:
Users that are interested in Detect-CVE-2017-15361-TPM are comparing it to the libraries listed below
- Supporting files for cyber challenge exercises. #nsacyber☆45Updated 6 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- Maltego integration of https://haveibeenpwned.com☆60Updated last year
- Passive Network Audit Framework☆32Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- ☆26Updated 4 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆111Updated 8 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆35Updated 11 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆83Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Updated 8 years ago
- ☆27Updated 4 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 3 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 5 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 2 weeks ago