nsacyber / Detect-CVE-2017-15361-TPMLinks
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
☆59Updated 7 years ago
Alternatives and similar repositories for Detect-CVE-2017-15361-TPM
Users that are interested in Detect-CVE-2017-15361-TPM are comparing it to the libraries listed below
Sorting:
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- The User Interface for GoCrack☆88Updated 2 months ago
- GUI Tool to generate threat intelligence information in various formats☆45Updated 8 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Updated 8 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Miscellaneous analysis tools☆25Updated 10 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- ☆25Updated 2 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆70Updated last month
- Security tools, scanners, exploit code☆31Updated 8 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- ☆52Updated last month
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- A USB armory based USB sandbox☆21Updated 8 years ago
- Assesses CPU security of embedded devices. #nsacyber☆140Updated 9 years ago
- ☆30Updated 5 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆44Updated 8 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- A curated list of tools for incident response☆34Updated last year
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Updated 12 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago