8000 GitHub - mlcsec/SigFinder: Identify binaries with Authenticode digital signatures signed to an internal CA/domain
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

mlcsec/SigFinder

Folders and files

< 8BF5 table class="Table-module__Box--h4W6R DirectoryContent-module__Table--DNJx9" aria-labelledby="folders-and-files">NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

SigFinder

Identify binaries with Authenticode digital signatures signed to an internal CA/domain. Useful for enumerating Windows directory paths referenced in WDAC policies or searching for internal LOB applications.

C:\Tools> SigFinder.exe
Usage: SigFinder.exe <directoryPath> [-ignore <string1>,<string2>,...] [-recursive] [-domain <domain>]

Optional flags:

  • -ignore - ignore all certificates containing supplied string/comma seperated strings
  • -recursive - recursively check for certificates from the provided directory path
  • -domain - only display certificates containing the the domain keyword

sigfinder


NOTE

Add quotes to directory paths containing spaces and either REMOVE the trailing backslash or ADD a backslash:

beacon> executeInline-Assembly --dotnetassembly C:\Tools\SigFinder.exe "C:\Program Files" -ignore microsoft
beacon> executeInline-Assembly --dotnetassembly C:\Tools\SigFinder.exe "C:\Program Files\\" -ignore microsoft

Your beacon WILL DIE if you don't.

About

Identify binaries with Authenticode digital signatures signed to an internal CA/domain

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0