InvalidSign is a security research tool designed to bypass endpoint detection and response (EDR) solutions that block execution of known malicious signed applications. The tool works by obtaining valid signed files with different hash values, effectively circumventing signature-based detection mechanisms that rely on file hashes to identify and block malicious executables. InvalidSign demonstrates this bypass technique through analysis of legitimate system files like cmd.exe and generates test files to validate the evasion method. The tool focuses on exploiting the gap between signature validation and hash-based detection, allowing researchers to understand how signed malware can evade certain security controls. This research tool helps security professionals understand the limitations of hash-based detection systems and the potential for abuse of legitimate code signing certificates.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A suite of tools for Wi-Fi network security assessment and penetration testing.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Interactive online malware sandbox for real-time analysis and threat intelligence
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
SharpEDRChecker scans system components to detect security products and tools.