nsacyber / Detect-CVE-2017-15361-TPMLinks
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
☆59Updated 7 years ago
Alternatives and similar repositories for Detect-CVE-2017-15361-TPM
Users that are interested in Detect-CVE-2017-15361-TPM are comparing it to the libraries listed below
Sorting:
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆70Updated 2 weeks ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- no longer maintained☆17Updated 7 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- ☆29Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- Malquarium - Modern Malware Repository☆47Updated last week
- Security tools, scanners, exploit code☆31Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆14Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- ☆25Updated 2 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Dragon Sandbox☆79Updated 12 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- The User Interface for GoCrack☆88Updated last week