post-cyberlabs / VMK-extractor-for-bitlocker-with-tpm-and-pin
Extract VMK of BitLocker volume with TPMAndPIN protector and knowing PIN
☆10Updated 7 months ago
Alternatives and similar repositories for VMK-extractor-for-bitlocker-with-tpm-and-pin
Users that are interested in VMK-extractor-for-bitlocker-with-tpm-and-pin are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆36Updated 7 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- PoC code and tools for Black Hat USA 2024☆21Updated 9 months ago
- A collection of various exploits☆28Updated 7 months ago
- BlackHat Asia 2025 code and presentations☆15Updated last month
- ☆18Updated 4 months ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 6 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆12Updated 2 years ago
- A repository with UEFI research stuff☆14Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆11Updated 3 years ago
- ☆24Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 2 weeks ago
- ☆30Updated 2 months ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated 2 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆13Updated 3 months ago
- ☆30Updated last year
- ☆28Updated 6 months ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- ☆12Updated 7 months ago
- ☆8Updated 11 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year