Pwn3rzs / PTNADKeygenLinks
Keygen for Positive Technologies Network Attack Detector
☆30Updated last year
Alternatives and similar repositories for PTNADKeygen
Users that are interested in PTNADKeygen are comparing it to the libraries listed below
Sorting:
- ☆160Updated last year
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- A command and control (C2) server☆57Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Windows And Ways To Break It☆99Updated last year
- Privileger is a tool to work with Windows Privileges☆138Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- A command and control framework.☆54Updated 8 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Reverse Shell - technique is commonly used in cyber attacks☆17Updated last year
- GitHub CVE Repository Hunt☆19Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated 11 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- ☆27Updated this week
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 2 months ago
- ☆12Updated last year
- Antivirus Signature Search Toolkit☆80Updated 2 years ago
- RCE PoC for Empire C2 framework <5.9.3☆29Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆63Updated last month
- ☆46Updated 2 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 8 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year