A keygen for Specter Insight C2
☆45Feb 17, 2025Updated last year
Alternatives and similar repositories for SpecterInsightKeygen
Users that are interested in SpecterInsightKeygen are comparing it to the libraries listed below
Sorting:
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆12Jul 23, 2025Updated 7 months ago
- ☆55May 31, 2025Updated 9 months ago
- IDA plugin for YARA signature creation☆19Nov 30, 2025Updated 3 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆162Jun 19, 2025Updated 8 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- 免杀shellcode☆14Sep 8, 2021Updated 4 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Jun 19, 2024Updated last year
- DnsClientX is an async C# library for DNS over UDP, TCP, HTTPS (DoH), and TLS (DoT). It also has a PowerShell module that can be used to …☆23Feb 19, 2026Updated last week
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆107Feb 18, 2025Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 7 months ago
- ad vulnerability scanner☆74Dec 21, 2023Updated 2 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- The code I write in my blog☆80Feb 21, 2026Updated last week
- AppX RPC Local Privilege Escalation - Windows 10/11☆92Feb 7, 2024Updated 2 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- command control framework☆32Updated this week
- ☆19Jan 24, 2023Updated 3 years ago
- ☆23Dec 23, 2024Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- ☆49May 8, 2023Updated 2 years ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated 11 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- vBulletin 5.x 未授权远程代码执行漏洞☆21Sep 26, 2019Updated 6 years ago
- external c2 use domainhiding.☆50Oct 27, 2020Updated 5 years ago
- GYscan是一款基于Go语言开发的现代化综合渗透测试工具,专为安全研究人员、渗透测试工程师和红队成员设计。项目采用模块化架构,包含C2服务器端和客户端组件,支持Windows和Linux平台,提供系统安全分析和漏洞扫描功能。☆71Updated this week
- 哥斯拉webshell管理工具的插件,用于连接websocket型webshell☆176Apr 17, 2024Updated last year
- Keygen for Positive Technologies Network Attack Detector☆33Dec 7, 2023Updated 2 years ago
- ☆48Oct 14, 2025Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 9 months ago
- 最强大的密码爆破/喷洒工具 | The most powerful bruteforcer / sprayer Artifact☆350Apr 10, 2025Updated 10 months ago
- Simple .NET Assembly deobfuscator.☆26Apr 2, 2021Updated 4 years ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 4 months ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- Automated mRemoteNG Decrypt Tool☆27Apr 14, 2024Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago