Library for crypt HWID(Issuance of a license)
☆12Aug 7, 2021Updated 4 years ago
Alternatives and similar repositories for CryptHWID
Users that are interested in CryptHWID are comparing it to the libraries listed below
Sorting:
- Easy Fix for the Forza Horizon 4 & 5 crashes.☆15Jan 28, 2024Updated 2 years ago
- Loader nSkinz for CS:GO☆17Oct 23, 2022Updated 3 years ago
- Easy Legit CS:GO Hack☆49Jan 28, 2024Updated 2 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 7 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Official Documentation for the Binance APIs and Streams☆14May 22, 2019Updated 6 years ago
- A graphical user interface (Winforms) to easily sign Executable and DLL content using the Signtool.exe provided in the Windows SDK.☆10Dec 23, 2016Updated 9 years ago
- An old cheat loader i had lying around on my computer.☆12Oct 17, 2019Updated 6 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆15Dec 14, 2023Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- ☆13Aug 30, 2024Updated last year
- Anti-Debug methods with C#☆14Dec 20, 2020Updated 5 years ago
- USB HID for Penetration Testing☆13Apr 6, 2016Updated 9 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- 🔐 Wrapper arround .NET Cryptography library☆17Sep 23, 2025Updated 5 months ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Creates a deployable MSI from a folder that has an executable in it☆17Jul 12, 2022Updated 3 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- filter driver to hide files and directories☆25Feb 12, 2024Updated 2 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Free for everyone who owns Synapse X, which is a Roblox exploit. Fully customization and does not use any other external controls, only t…☆16Nov 10, 2019Updated 6 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆15Aug 29, 2023Updated 2 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago