nsacyber / Detect-CVE-2017-15361-TPM
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
☆55Updated 6 years ago
Alternatives and similar repositories for Detect-CVE-2017-15361-TPM:
Users that are interested in Detect-CVE-2017-15361-TPM are comparing it to the libraries listed below
- Supporting files for cyber challenge exercises. #nsacyber☆44Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 3 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- ☆26Updated 4 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- no longer maintained☆16Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 11 months ago
- Landing page for MAEC docs☆20Updated 2 years ago
- Rekall is an endpoint security solution.☆39Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- newly registered domain name/brand infringement detector☆23Updated 2 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆53Updated 7 years ago
- Maltego integration of https://haveibeenpwned.com☆60Updated 11 months ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- general purpose and malware specific analysis tools☆101Updated 9 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- ☆17Updated 5 years ago