Windows-SignedBinary

Signature manipulation

This project explores bypassing endpoint solutions by creating files with different hashes while maintaining the same signature

GitHub

6 stars
2 watching
1 forks
Language: Python
last commit: about 7 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
netspi/awssigner Tool to validate and generate AWS SigV4 signatures in Burp Suite extensions 86
google/vxsig Automatically generates AV byte signatures from sets of similar binaries using a signature generation algorithm. 259
citizenlab/malware-signatures Yara rules for identifying malware families in targeted threats 134
cleanunicorn/abi2signature Generates Ethereum ABI signatures from contract ABIs or function signatures 55
secretsquirrel/sigthief A tool that generates invalid signatures to test antivirus software's signature verification and validation capabilities. 2,116
rhinosecuritylabs/security-research Exploits and security research written by a team of experts 1,059
certuscyber/bapp-certus Tools to identify vulnerabilities in application variable types by manipulating JSON data 0
pyca/bcrypt A modern password hashing library for Python 1,250
jacqueswww/vim-vyper Syntax highlighting solution for an experimental smart contract language 12
bonnetn/vba-obfuscator A tool to protect VBA macros by obfuscating their code to evade antivirus signatures 150
vysecurity/cve-2018-4878 Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. 87
gbleaney/python_security Lists and provides examples of Python libraries and APIs vulnerable to remote code execution 35
gobysec/weblogic Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities 155
vernamlab/medusa Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols 18
blackout314/whereismypi Tools to identify devices on a local network. 3