A keygen for Specter Insight C2
☆47Feb 17, 2025Updated last year
Alternatives and similar repositories for SpecterInsightKeygen
Users that are interested in SpecterInsightKeygen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- ☆55May 31, 2025Updated 9 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- IDA plugin for YARA signature creation☆19Nov 30, 2025Updated 3 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆23Dec 16, 2023Updated 2 years ago
- The code I write in my blog☆85Feb 21, 2026Updated last month
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Jun 19, 2024Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago
- 免杀shellcode☆14Sep 8, 2021Updated 4 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 8 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆113Feb 18, 2025Updated last year
- ad vulnerability scanner☆74Dec 21, 2023Updated 2 years ago
- ☆49May 8, 2023Updated 2 years ago
- 哥斯拉webshell管理工具的插件,用于连接websocket型webshell☆176Apr 17, 2024Updated last year
- Golang tool to help in forcing a license for HAK5 C2 Tool☆58Dec 12, 2023Updated 2 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- AppX RPC Local Privilege Escalation - Windows 10/11☆92Feb 7, 2024Updated 2 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- Rapid prototyping HTTP toolkit based on Netty. Supports container-style jars, multi-hosting, REST primitives.☆19Jul 14, 2013Updated 12 years ago
- 一个demo☆23Apr 2, 2024Updated last year
- 后渗透信息/密码/凭证收集工具☆287May 7, 2025Updated 10 months ago
- A Windows 11 Rootkit. (Exploit has been patched)☆16Sep 7, 2025Updated 6 months ago
- command control framework☆33Updated this week
- ☆36Feb 1, 2026Updated last month
- Deobfuscator for NetShield Protector☆19Jun 29, 2023Updated 2 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- ☆15Oct 8, 2025Updated 5 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 4 months ago
- ☆19Jan 24, 2023Updated 3 years ago
- ☆40Nov 25, 2024Updated last year
- Get sql server connection configuration information☆28Aug 26, 2024Updated last year