☆397Jun 13, 2025Updated 10 months ago
Alternatives and similar repositories for SignatureKid
Users that are interested in SignatureKid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 10 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆122Oct 19, 2025Updated 6 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆685Mar 24, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ForsHops☆60Mar 25, 2025Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆242Jan 24, 2025Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆317Mar 31, 2025Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 9 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- shell code example☆68Dec 12, 2025Updated 4 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆630Feb 2, 2026Updated 3 months ago
- A BOF that runs unmanaged PEs inline☆695Oct 23, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆61Feb 23, 2026Updated 2 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Kernel Level NMI Callback Blocker☆172Apr 23, 2026Updated last week
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 10 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Reaping treasures from strings in remote processes memory☆286Feb 8, 2025Updated last year
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 3 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆399Sep 26, 2025Updated 7 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆400Jan 23, 2025Updated last year
- ☆235Oct 8, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Ghosting-AMSI☆236Apr 24, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 10 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆794Jan 26, 2026Updated 3 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆304Jul 31, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated last year
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆269May 15, 2025Updated 11 months ago