secretsquirrel / SigThief
Stealing Signatures and Making One Invalid Signature at a Time
☆2,154Updated 3 years ago
Alternatives and similar repositories for SigThief:
Users that are interested in SigThief are comparing it to the libraries listed below
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,189Updated last year
- Converts PE into a shellcode☆2,439Updated last year
- AV/EDR evasion via direct system calls.☆1,833Updated 2 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,600Updated 11 months ago
- Open-Source Shellcode & PE Packer☆1,874Updated 11 months ago
- Reflective PE packer.☆1,230Updated 11 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,724Updated 3 months ago
- Alternative Shellcode Execution Via Callbacks☆1,501Updated 2 years ago
- Windows Event Log Killer☆1,769Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,266Updated 6 months ago
- AV/EDR evasion via direct system calls.☆1,584Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,379Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,505Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,116Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,716Updated this week
- Antivirus evasion project☆1,074Updated last week
- A tool to kill antimalware protected processes☆1,406Updated 3 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,257Updated 4 years ago
- This program is designed to demonstrate various process injection techniques☆1,101Updated last year
- UAC bypass, Elevate, Persistence methods☆2,648Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,203Updated last month
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,511Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,489Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,365Updated 5 months ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,813Updated 2 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆908Updated 3 years ago
- C/C++ source obfuscator for antivirus bypass☆1,018Updated 2 years ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,869Updated 2 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,078Updated last year
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,645Updated last year