secretsquirrel / SigThiefLinks
Stealing Signatures and Making One Invalid Signature at a Time
☆2,275Updated 4 years ago
Alternatives and similar repositories for SigThief
Users that are interested in SigThief are comparing it to the libraries listed below
Sorting:
- Converts PE into a shellcode☆2,625Updated this week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,356Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,146Updated last month
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,779Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,982Updated 3 weeks ago
- Reflective PE packer.☆1,333Updated last year
- AV/EDR evasion via direct system calls.☆1,913Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,725Updated 2 years ago
- Open-Source Shellcode & PE Packer☆1,991Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,361Updated last year
- Windows Event Log Killer☆1,797Updated last year
- Alternative Shellcode Execution Via Callbacks☆1,604Updated 2 years ago
- A tool to kill antimalware protected processes☆1,465Updated 4 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,510Updated last year
- Antivirus evasion project☆1,123Updated 7 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,155Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,204Updated last year
- C/C++ source obfuscator for antivirus bypass☆1,044Updated 3 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,480Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,035Updated 2 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,539Updated 4 years ago
- Shellcode Compiler☆1,117Updated 11 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,560Updated 4 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,189Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,647Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆1,151Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,512Updated 2 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,129Updated 2 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,710Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,407Updated 2 months ago