Whitecat18 / Windows-Activator
Activate your windows machines in one step.
☆87Updated last year
Alternatives and similar repositories for Windows-Activator:
Users that are interested in Windows-Activator are comparing it to the libraries listed below
- TP link AC600 Drivers for All Linux distros☆21Updated 11 months ago
- Commands and Scripts to attack Linux and Servers☆24Updated 5 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆32Updated last year
- ☆20Updated 2 months ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆33Updated 2 months ago
- What the name says....☆91Updated 5 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆27Updated 6 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆390Updated 4 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆28Updated 5 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last month
- Activate all editions of Windows 8, 8.1, 10 and 11 for free without buying any product key☆172Updated last year
- ☆34Updated last month
- Windows Exploit Protection Settings (Ultimate)☆59Updated last week
- Roadmap for cybersecurity beginners.☆26Updated last year
- Advanced dynamic malware analysis tool.☆78Updated last year
- Some settings stolen from multiple scripts @ZephrFish☆116Updated 11 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆41Updated 4 months ago
- Reverse Engineering and Malware Analysis Roadmap☆74Updated 6 months ago
- ☆21Updated 2 years ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆56Updated 2 weeks ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆53Updated 5 months ago
- Welcome to Page where you will find all kind free and premium cyber security/hacking/pentesting related ebooks☆95Updated 2 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆148Updated 6 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆53Updated last year
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆12Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆40Updated 7 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated 2 years ago
- ☆33Updated 9 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆76Updated 5 months ago