Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)
☆26Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for sigspoox
Users that are interested in sigspoox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆75Feb 4, 2024Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆103Jan 7, 2022Updated 4 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 9 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- ☆176Mar 27, 2023Updated 3 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Hijack Printconfig.dll to execute shellcode☆101Jan 15, 2021Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12May 5, 2021Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆59Apr 13, 2023Updated 2 years ago
- ☆28Mar 14, 2026Updated last week
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 3 years ago
- ☆50Jul 9, 2025Updated 8 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆349Jul 3, 2022Updated 3 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- MBSE BBS☆15Aug 21, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆158Jul 22, 2021Updated 4 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆300Sep 28, 2021Updated 4 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago