Pwn3rzs / PTNADKeygenLinks
Keygen for Positive Technologies Network Attack Detector
☆23Updated last year
Alternatives and similar repositories for PTNADKeygen
Users that are interested in PTNADKeygen are comparing it to the libraries listed below
Sorting:
- hiding in plain sight: part 2☆45Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- ☆33Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Ensemble-HackTools is an awesome collection of hacking tools.☆25Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆39Updated 4 years ago
- Make an Linux Kernel rootkit visible again.☆53Updated 4 months ago
- Original PoC for CVE-2023-30367☆14Updated last year
- Golang tool to help in forcing a license for HAK5 C2 Tool☆51Updated last year
- Small collection of Active Directory pentesting tools.☆31Updated last year
- AntiRansomware Linux Kernel Module☆37Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆30Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 3 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- Search for c2 servers based on netlas☆39Updated 2 years ago
- ☆12Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆27Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆16Updated last month
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- Another Hardening Windows Tool☆51Updated 11 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- web based c2 🏴☠️☆13Updated 11 months ago