elpscrk
pcileech
elpscrk | pcileech | |
---|---|---|
5 | 6 | |
769 | 4,689 | |
- | - | |
0.0 | 6.5 | |
about 2 months ago | 3 months ago | |
Python | C | |
GNU General Public License v3.0 only | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
elpscrk
- how did he do it , like for example to crack a wifi pass you need to capture a handshake first then only you can use a dictionary attack . i really wanna know how he did it?
- Does anyone know what command this is
-
User:pass wordlist generator?
Here is one. https://github.com/D4Vinci/elpscrk I haven't used it much because i am not mr alderson.
-
Does this tool really exist?f
elpscrk on github
-
Odd Request
link
pcileech
-
Astounding Data Stream Hack Gets UCI World Championship Qualifier Banned
And this is the base repo it was forked from that goes into way more technical details: https://github.com/ufrisk/pcileech
-
Nvidia drivers + Linux: is there still telemetry?
All PCIe devices have full DMA capabilities and can do whatever they want with main memory with no real recourse from software and there are several open source projects and examples that illustrate just how easy it would be for a company full of smart people such as Nvidia to develop something similar, especially because they're able to make the hardware to their own specifications.
- Is BitLocker still secure enough and if not, what can you do instead to prevent people, that have physical access, from breaking into your device?
-
It seems you can cheat replays on donadigo's Competion Patch too
Thanks for the very insightful info. I've never done it myself but I think it all has been done already: https://github.com/ufrisk/pcileech
-
Odd Request
Have a look at this: https://github.com/ufrisk/pcileech
-
BitLocker Lockscreen Bypass
* Unless you get an Evil Maid attack [0], like adding a physical keylogger to the keyboard bus.
If the device is decrypted but on lock screen (like with TPM) there are more options, the main one is reading memory via DMA [1] on an ExpressCard slot (eg the wifi card). Also swapping out the memory to do a cold boot attack [2] is possible.
[0] https://en.wikipedia.org/wiki/Evil_maid_attack
[1] https://github.com/ufrisk/pcileech
[2] https://en.wikipedia.org/wiki/Cold_boot_attack
What are some alternatives?
pydictor - A powerful and useful hacker dictionary builder for a brute-force attack
go-pcie-screamer - Provides io.ReadWriter interface for a PCIe screamer device
phpass - Python implementation of the portable PHP password hashing framework
pcie_screamer - PCIe Screamer - TLPs experiments...
thc-hydra - hydra
Cracker - Hashcat. Automated.
ssh-crypt - This tool helps you to keep passwords inside your shell scripts safely
Chromiux - Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.
password-mixin - Small Python library that adds password hashing methods to ORM objects
Narthex - Modular personalized dictionary generator.