The tool used to clone the digital signatures of legitimate programs
☆56Oct 11, 2025Updated 4 months ago
Alternatives and similar repositories for CertClone
Users that are interested in CertClone are comparing it to the libraries listed below
Sorting:
- dcsync bof☆44Feb 13, 2026Updated 2 weeks ago
- This tool helps inject code into the processes of Antivirus programs.☆186Nov 1, 2025Updated 4 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- ☆32Updated this week
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- ☆15Feb 5, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Windows Driver Unit Test Framework☆30Aug 5, 2024Updated last year
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated 2 weeks ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- React2Shell Proof of Concept☆89Jan 3, 2026Updated 2 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- ASP & ASP.NET WebShell Bypass☆68Jan 4, 2026Updated last month
- Obfuscate the bytes of your payload with an association dictionary☆74Nov 7, 2025Updated 3 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 3 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆187Jan 11, 2026Updated last month
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 5 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆96Nov 7, 2025Updated 3 months ago
- ☆42Feb 18, 2025Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 7 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆21May 19, 2024Updated last year
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 8 months ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆81Nov 1, 2025Updated 4 months ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆14Apr 19, 2025Updated 10 months ago
- Write a cross-platform, multifunctional CMS in Rust, supporting content such as videos, audio, image galleries, and comics. RUST编写全平台多功能C…☆14Sep 25, 2025Updated 5 months ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- Omni CloudNative platform featuring intelligent-automation technology and advanced scalable-architecture for modern gateway☆25Feb 10, 2026Updated 3 weeks ago
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆22Jan 23, 2026Updated last month
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week