garatc

garatc / BitUnlocker

Public

Downgrade attack for CVE-2025-48804

46
6
69% credibility
Found May 12, 2026 at 46 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

BitUnlocker is a proof-of-concept tool demonstrating a boot manager downgrade attack to access BitLocker-encrypted Windows 11 disks in minutes using USB or network boot.

How It Works

1
🔍 Find BitUnlocker

You come across this security testing tool that shows how to quickly unlock BitLocker-protected Windows computers for research.

2
📥 Download ready files

Grab the special boot files from the releases and copy them onto a USB stick.

3
🔄 Restart into recovery

Hold Shift while restarting the test computer to reach the troubleshooting command screen.

4
✏️ Set boot directions

In the command screen, update the boot guide to point to your special recovery files on the USB.

5
Pick boot way
🪟
USB boot

Plug in the stick and boot from it right away.

🌐
Network boot

Connect ethernet cable and boot over the network.

6
🚀 Start the boot

Select your USB or network option and feel the excitement as the custom recovery loads up.

7
Wait a bit

Sit back for a few minutes while the recovery package transfers and sets everything up.

Drive unlocked

A command screen appears with your protected drive open and ready to access.

Sign up to see the full architecture

6 more

Sign Up Free

Star Growth

See how this repo grew from 46 to 46 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is BitUnlocker?

BitUnlocker is a Python-based proof-of-concept for a downgrade attack on BitLocker-encrypted Windows 11 drives, exploiting CVE-2025-48804 to decrypt TPM-only volumes (PCR 7+11) in under 5 minutes with physical access. It delivers a patched boot environment via USB or PXE, bypassing the need for a BitLocker recovery key by loading a custom recovery image through SDI manipulation. Developers get pre-built files and scripts to parse or build these SDI files for testing BitLocker deaktivieren scenarios on patched systems trusting old PCA 2011 certs.

Why is it gaining traction?

This stands out for targeting fully patched Windows 11 BitLocker setups that shrug off typical attacks, using a straightforward USB boot for quick BitLocker recovery key extraction without network dependencies. The PXE option adds flexibility for lab environments, and it builds directly on Microsoft STORM research, making downgrade attack prevention testing dead simple. With clear step-by-step docs, it's hooking security devs exploring downgrade attacks in cryptography like MITRE-defined boot chains.

Who should use this?

Red teamers and security researchers with physical access for authorized pentests on enterprise Windows 11 fleets using BitLocker Windows 11 configs. Ideal for auditing BitLocker wiederherstellungsschlüssel finden weaknesses or validating mitigations like TPM+PIN before rollout. Skip if you're a sysadmin without explicit permission—it's strictly for ethical research.

Verdict

Grab it if you're deep in BitLocker downgrade attacke testing; the docs are solid for a 46-star PoC, but the 0.699999988079071% credibility score flags it as early-stage—test thoroughly and watch for updates. Strong for research, but pair with official patches for production defense.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.