Activate your windows machines in one step.
☆119Jan 18, 2024Updated 2 years ago
Alternatives and similar repositories for Windows-Activator
Users that are interested in Windows-Activator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Commands and Scripts to attack Linux and Servers☆39May 1, 2025Updated 11 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Feb 4, 2024Updated 2 years ago
- Config files for my GitHub profile.☆16Dec 30, 2025Updated 3 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆37Aug 7, 2024Updated last year
- ☆27Nov 24, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated last year
- PlanqX EDR is an open-source, advanced Endpoint Detection and Response (EDR) solution for Windows, offering real-time system and network …☆25Jun 5, 2025Updated 10 months ago
- ☆21Feb 7, 2024Updated 2 years ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 4 months ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆115Mar 6, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Auditor app prebuilt using the latest official release of the Auditor app.☆11Updated this week
- ☆14Jul 26, 2025Updated 8 months ago
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- Lista IPTV com webcanais que transmitem gratuitamente pela internet, sem exigência de login.☆18Mar 2, 2026Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24May 6, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 7 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago
- .NET Obfuscator designed to protect applications from reverse-engineering through advanced code obfuscation techniques.☆16Dec 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- ☆23Nov 29, 2023Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆481Mar 15, 2026Updated 3 weeks ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆40Nov 11, 2025Updated 4 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- The code I write in my blog☆93Feb 21, 2026Updated last month
- Detection Engineering Tools☆25Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆16Mar 30, 2025Updated last year
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- New way to write Markdown☆11Dec 14, 2024Updated last year
- A very very very simple tool to compile folder to fake ps4/ps5 pkg☆16Dec 3, 2023Updated 2 years ago
- Nobitex exchange rate receiving robot☆27Feb 10, 2025Updated last year
- Fssociety Hacking Tools Pack. A Penetration Testing Framework, you will have every script that a hacker needs. This is a top hidden tool …☆52Aug 4, 2020Updated 5 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 8 months ago