
Top picks: Zenyard RE Agent, Darkarmour, Donut — plus 45 more compared.
Security OperationsSigThief is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to SigThief, including their key features and shared capabilities.
AI agent for in-depth binary analysis and reverse engineering assistance.
Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Private training course for IoT device pentesting and exploitation
AI agent for in-depth binary analysis and reverse engineering assistance.
Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Private training course for IoT device pentesting and exploitation
Whole-system emulation environment for software dev, debugging, testing & security
Post-exploitation threat emulation platform for red team operations.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
Bundled offensive security suites combining pen testing, red teaming, and VM.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
A Python script that converts shellcode into a PE32 or PE32+ file.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.
A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.
Charlotte is an undetected C++ shellcode launcher for executing shellcode with stealth.
CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.
EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.
A template-driven framework for creating custom evasion techniques to test Anti-Virus and EDR detection capabilities.
InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
MSBuildAPICaller is an offensive security tool that enables interaction with the MSBuild API to execute arbitrary scripts for red teaming and penetration testing purposes.
An open-source shellcode and PE packer for creating and managing portable executable files.
RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.
RedWarden is a Cobalt Strike C2 reverse proxy that uses packet inspection and malleable profile correlation to evade detection by security controls during red team operations.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
PinCTF is a Python wrapper tool that uses Intel's Pin framework to instrument binaries and count instructions for reverse engineering analysis.
Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.
Fridump is an open source memory dumping tool that uses the Frida framework to extract accessible memory addresses from iOS, Android, and Windows applications for security testing and analysis.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.
angr is a Python-based binary analysis framework that provides disassembly, symbolic execution, and program analysis capabilities for cross-platform binary examination.
A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.
Fernflower is an analytical decompiler for Java with command-line options and support for external classes.
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
A powerful tool for extracting passwords and performing various Windows security operations.
A backend agnostic debugger frontend for debugging binaries without source code access.
ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.
JD-GUI is a graphical Java decompiler that reconstructs and displays source code from compiled ".class" files for reverse engineering and code analysis purposes.
Common questions security professionals ask when evaluating alternatives and competitors to SigThief.
The most popular alternatives to SigThief include Zenyard RE Agent, Darkarmour, Donut, TikiTorch, and Ultimate AppLocker Bypass List. These Offensive Security tools offer similar capabilities and are frequently compared by security professionals evaluating their options.