duhirsch / sigspoox
Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)
☆25Updated 2 years ago
Alternatives and similar repositories for sigspoox:
Users that are interested in sigspoox are comparing it to the libraries listed below
- Load a dynamic library from memory using a fuse mount☆30Updated last year
- Disable PPL via custom driver and dump lsass☆13Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- Cobalt Strike Get clipboard plugin☆12Updated last year
- all credits go to @mgeeky☆59Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- LoadLibrary for offensive operations☆32Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆26Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 11 months ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆33Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Repository for dirty scripts and PoCs☆16Updated this week
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- ☆26Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆21Updated 4 years ago
- ☆81Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆39Updated 4 years ago
- ☆29Updated 2 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆26Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆32Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago