Binaries, PowerShell scripts and information about Digital Signature Hijacking.
☆227Nov 7, 2017Updated 8 years ago
Alternatives and similar repositories for Digital-Signature-Hijack
Users that are interested in Digital-Signature-Hijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆101Jan 7, 2018Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231May 30, 2019Updated 6 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- A tool to run .Net DLLs from the command line☆105Oct 23, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆47Oct 18, 2016Updated 9 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- ☆92Apr 17, 2021Updated 4 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- Windows sandbox PoC☆32May 25, 2020Updated 5 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- Run shellcode from resource☆259Dec 13, 2020Updated 5 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Protect process fsfilter driver. Windows x64☆36Apr 11, 2016Updated 9 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- Use NT Native Registry API to create a registry that normal user can not query.☆94Dec 7, 2017Updated 8 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 3 weeks ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆404Jun 6, 2020Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Jul 21, 2020Updated 5 years ago
- Stealing Signatures and Making One Invalid Signature at a Time☆2,382Aug 11, 2021Updated 4 years ago