Pwn3rzs / PTNADKeygenLinks
Keygen for Positive Technologies Network Attack Detector
☆31Updated 2 years ago
Alternatives and similar repositories for PTNADKeygen
Users that are interested in PTNADKeygen are comparing it to the libraries listed below
Sorting:
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago
- ☆31Updated last week
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 7 months ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ☆40Updated last year
- ☆49Updated 5 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆77Updated last year
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆113Updated 2 years ago
- A keygen for Specter Insight C2☆40Updated 9 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆66Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Bypass Malware Sandbox Evasion Ram check☆142Updated 2 years ago
- A command and control framework.☆55Updated 11 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆102Updated 6 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- ☆163Updated 2 years ago
- Memory Scaner☆64Updated 3 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago