
Top picks: InvisibilityCloak, Macro_Pack, RedGuard — plus 45 more compared.
Security OperationsDarkarmour is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Darkarmour, including their key features and shared capabilities.
InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.
Shares 3 capabilities with Darkarmour: Obfuscation, Open Source, Evasion
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
Fridump is an open source memory dumping tool that uses the Frida framework to extract accessible memory addresses from iOS, Android, and Windows applications for security testing and analysis.
A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.
A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.
InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
Fridump is an open source memory dumping tool that uses the Frida framework to extract accessible memory addresses from iOS, Android, and Windows applications for security testing and analysis.
A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.
A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.
A PHP-based command and control framework that maintains persistent web server access through polymorphic backdoors and HTTP header communication tunneling.
SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Whole-system emulation environment for software dev, debugging, testing & security
Post-exploitation threat emulation platform for red team operations.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
Bundled offensive security suites combining pen testing, red teaming, and VM.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
R&D firm providing cyber defense & operational tech for DoD and DHS.
AI agent for in-depth binary analysis and reverse engineering assistance.
An open-source framework that enables building and deploying AI security tools
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.
A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.
CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
A template-driven framework for creating custom evasion techniques to test Anti-Virus and EDR detection capabilities.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.
MSBuildAPICaller is an offensive security tool that enables interaction with the MSBuild API to execute arbitrary scripts for red teaming and penetration testing purposes.
PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.
RedWarden is a Cobalt Strike C2 reverse proxy that uses packet inspection and malleable profile correlation to evade detection by security controls during red team operations.
SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.
A comprehensive .NET post-exploitation library designed for advanced security testing.
SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
A demonstration of a method to delete a locked executable or currently running file from disk.
Anti-forensics tool for Red Teamers to erase footprints and test incident response capabilities.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.
Aptoide is an alternative Android application marketplace that enables APK downloads and metadata retrieval for mobile security research and analysis.
Common questions security professionals ask when evaluating alternatives and competitors to Darkarmour.
The most popular alternatives to Darkarmour include InvisibilityCloak, Macro_Pack, RedGuard, Skyhook, and TikiTorch. These Offensive Security tools offer similar capabilities and are frequently compared by security professionals evaluating their options.