☆392Jun 13, 2025Updated 10 months ago
Alternatives and similar repositories for SignatureKid
Users that are interested in SignatureKid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- ForsHops☆59Mar 25, 2025Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆123Oct 19, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆673Mar 24, 2026Updated 3 weeks ago
- Hooking Windows' exception dispatcher to protect process's PML4☆239Jan 24, 2025Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆313Mar 31, 2025Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆60Feb 23, 2026Updated last month
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 10 months ago
- shell code example☆68Dec 12, 2025Updated 4 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆615Feb 2, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A BOF that runs unmanaged PEs inline☆690Oct 23, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Kernel Level NMI Callback Blocker☆169Sep 27, 2025Updated 6 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆52Sep 10, 2025Updated 7 months ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆396Sep 26, 2025Updated 6 months ago
- ☆235Oct 8, 2024Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆389Jan 23, 2025Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ghosting-AMSI☆234Apr 24, 2025Updated 11 months ago
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 9 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆791Jan 26, 2026Updated 2 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆140Apr 6, 2025Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year