InvalidSign Logo

InvalidSign

0
Free
Visit Website

The InvalidSign tool aims to bypass endpoint solutions that block known 'malicious' signed applications by obtaining a valid signed file with a different hash, as demonstrated through the analysis of cmd.exe and the generation of test files.

FEATURES

ALTERNATIVES

A collection of incident response methodologies for various security incidents, providing easy-to-use operational best practices.

CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.

npm security team foils plot to steal $13 million in cryptocurrency

AWS Community repository of custom Config rules with instructions for leveraging and developing AWS Config Rules.

A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.

Incident response and digital forensics tool for transforming data sources and logs into graphs.

A robust and flexible hunt and incident response tool for investigating AzureAD, Azure, and M365 environments.

A Sysmon configuration repository for customizing Microsoft Sysinternals Sysmon configurations with modular setup.

PINNED