Whitecat18 / Windows-Activator
Activate your windows machines in one step.
☆89Updated last year
Alternatives and similar repositories for Windows-Activator:
Users that are interested in Windows-Activator are comparing it to the libraries listed below
- TP link AC600 Drivers for All Linux distros☆19Updated 10 months ago
- Commands and Scripts to attack Linux and Servers☆23Updated 4 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆30Updated 11 months ago
- ☆19Updated last month
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆31Updated 3 weeks ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆24Updated 5 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆381Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- What the name says....☆89Updated 4 months ago
- Windows Exploit Protection Settings (Ultimate)☆59Updated 2 months ago
- NetProbe: Network Probe☆153Updated 3 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆40Updated 3 months ago
- ☆60Updated 8 months ago
- A powershell module for hiding payloads in the pixels of images☆56Updated 6 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆52Updated last year
- Privacy and security baseline for personal Windows 10 and Windows 11☆187Updated last year
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)☆57Updated this week
- Create and enumerate hidden desktops.☆89Updated last year
- 🕵️ Email osint tool☆62Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆25Updated 4 months ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆73Updated 2 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- Some settings stolen from multiple scripts @ZephrFish☆114Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆42Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆140Updated 7 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆44Updated last year
- A collection of tools that I use in CTF's or for assessments☆80Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆312Updated 3 months ago