nsacyber / Detect-CVE-2017-15361-TPM
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
☆55Updated 6 years ago
Alternatives and similar repositories for Detect-CVE-2017-15361-TPM
Users that are interested in Detect-CVE-2017-15361-TPM are comparing it to the libraries listed below
Sorting:
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 8 years ago
- Endpoint monitoring stack.☆18Updated 9 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- ☆24Updated last year
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Rekall is an endpoint security solution.☆39Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated last month
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- ☆26Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ☆15Updated 5 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆89Updated last month
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago