Pwn3rzs / PTNADKeygen
Keygen for Positive Technologies Network Attack Detector
☆22Updated last year
Alternatives and similar repositories for PTNADKeygen:
Users that are interested in PTNADKeygen are comparing it to the libraries listed below
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 11 months ago
- VLAN ID Parser☆6Updated 9 months ago
- Search for c2 servers based on netlas☆39Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- ☆28Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆33Updated 3 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated last year
- Original PoC for CVE-2023-30367☆14Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- ☆56Updated last year
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- CHAOS RAT web panel path RCE PoC☆27Updated 10 months ago
- MalDev & AV-EDR Evasion for Pentesters☆14Updated 2 years ago
- ☆12Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- ☆17Updated 2 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 9 months ago
- aiohttp LFI (CVE-2024-23334)☆25Updated 11 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 10 months ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆44Updated last year
- Antivirus Signature Search Toolkit☆79Updated last year
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated 11 months ago
- A command and control framework.☆46Updated last month
- GitHub CVE Repository Hunt☆18Updated 6 months ago