secretsquirrel / SigThief
Stealing Signatures and Making One Invalid Signature at a Time
☆2,167Updated 3 years ago
Alternatives and similar repositories for SigThief:
Users that are interested in SigThief are comparing it to the libraries listed below
- Converts PE into a shellcode☆2,449Updated last year
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,203Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,746Updated 3 months ago
- AV/EDR evasion via direct system calls.☆1,838Updated 2 years ago
- Windows Event Log Killer☆1,771Updated last year
- Open-Source Shellcode & PE Packer☆1,880Updated last year
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,605Updated 11 months ago
- AV/EDR evasion via direct system calls.☆1,590Updated 2 years ago
- Reflective PE packer.☆1,242Updated 11 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,508Updated 4 years ago
- Alternative Shellcode Execution Via Callbacks☆1,506Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,121Updated last year
- A tool to kill antimalware protected processes☆1,412Updated 3 years ago
- Antivirus evasion project☆1,079Updated 3 weeks ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,374Updated 6 months ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,282Updated 6 months ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,869Updated 2 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,828Updated 2 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,729Updated last week
- Identifies the bytes that Microsoft Defender flags on.☆2,394Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,221Updated this week
- Shellcode Compiler☆1,083Updated 5 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,493Updated last year
- Kernel Driver Utility☆2,045Updated 3 months ago
- This program is designed to demonstrate various process injection techniques☆1,105Updated last year
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,118Updated last year
- A PowerShell script anti-virus evasion tool☆1,087Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,149Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,564Updated last year
- DLL Hijacking Detection Tool☆502Updated 5 years ago