Repository: Ixve/Red-Team-Tools Branch: main Commit: 4e7c0f45189e Files: 5 Total size: 23.6 KB Directory structure: gitextract__pfk93l0/ ├── README.md ├── acunetix_installer_windows.bat ├── burpsuite_installer_windows.bat ├── hclappscan_installer_windows.bat └── specterinsight_installer_windows.bat ================================================ FILE CONTENTS ================================================ ================================================ FILE: README.md ================================================ # ⚠️ WARNING ⚠️ As of 1/27/2024 these tools will not be checked for malware using any sort of environment, you are responsible for any damages done to your computer, run these strictly in a VM environment.

Make sure to read notes at the bottom before opening any issue.
Moved from gofile.io to pixeldrain.com (05/11/2025) - enjoy! # Cracked Red Teaming Tools. This is a full collection of red teaming tools which have been cracked by other people, if you need me to find anything, let me know via the issues tab.

### ℹ Sandboxes ℹ Sandboxing is useful when it comes to testing whether or not the tools contain malware, and it is *strongly* recommended to do so depending on the tool size. | Name | Link | Description | | :--- | ---- | ---: | | AnyRun | [any.run](https://app.any.run/) | A (mostly) free online interactive VM/sandbox, one of the best out there, requires business e-mail, however limited to 5 minutes per sample including a 16MB sample size (Bypassable up to 100-300MB) for free tier accounts | | TRIAGE | [tria.ge](https://tria.ge/) | A completely free online interactive VM/sandbox, less informative compared to AnyRun, however it needs just a singular log in using any email or even GitHub, with up to a 30-minute sample time limit and no sample size limit. | | HybridAnalysis | [hybrid-analysis.com](https://hybrid-analysis.com/) | A completely (login-)free online sandbox, unlike the others it is not interactive, has a 100MB file size limit and has a very long queue to get your file analyzed. | | JoeSandbox | [joesandbox.com](https://www.joesandbox.com/) | Appears to be a fully interactive online VM/sandbox with a 100MB file size limit, however I have never personally used it. | | CUCKOO | [cuckoo.cert.ee](https://cuckoo.cert.ee/) | A non-interactive completely (login-)free online sandbox, appears to have no file size limit and I have rarely used it personally. | ### 🐀 C2/RATs 🐀 ##### Windows/Linux (W - Windows , L - Linux) | Tool | Link | | :--- | ---: | | [W/L] Cobalt Strike v4.9.1 | [Download](https://gofile.io/d/U25hhJ) | | [L] Brute-Ratel v1.4.5 (Blitzkrieg) | [Missing File](https://github.com/ixve/red-team-tools/) | | [W] SpecterInsightC2 | [Download](https://pixeldrain.com/u/WyYAazhY) | | [W] VenomRAT v6.0.1 | [Download](https://pixeldrain.com/u/xVXeWbWb) | ##### Android | Tool | Link | | :--- | ---: | | CraxsRAT v6? (⚠️ **READ NOTES** ⚠️) | [Download](https://pixeldrain.com/u/e3MdYXM7) | | SpyNote v7.3.1 (❓ **READ NOTES** ❓) | [DOWN - Updated link may not come]() |

### 🎭 Exploitation Toolkits/Software 🎭 ###### Windows | Tool | Link | | :--- | ---: | | Immunity CANVAS v7.27 | [Download](https://pixeldrain.com/u/u8SeCmNe) | | Quantum .lnk Exploit Builder (02-10-22) | [Download](https://pixeldrain.com/u/9zjpYNQn) | | JexBot v1.0 (READ NOTES) | [Download](https://pixeldrain.com/u/Ea8kF2Hh) | | MetaSploit Pro | [Download](https://pixeldrain.com/u/u12Nsuzm) | ###### Linux | Tool | Link | | :--- | ---: | | MetaSploit Pro | [Download](https://pixeldrain.com/u/xS54Uxwa) |

### 🌐 Web App Security Tools 🌐 ##### Windows | Tool | Link | | :--- | ---: | | Invicti Pro v25.5 | [Download](https://pixeldrain.com/u/qZyTDWMc) | | Burp Suite PRO v2023.12.1 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/burpsuite_installer_windows.bat)) | [Download](https://pixeldrain.com/u/rWEidrKW) | | Acunetix v25.1.250204093 ([Install Script](https://github.com/Ixve/Red-Team-Tools/blob/main/acunetix_installer_windows.bat)) | [Download](https://pixeldrain.com/u/xTAiTMEg) | | Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/nHdXB2Uk) | | Super-Xray v1.7 | [Download](https://pixeldrain.com/u/GWa47ATW) | HCL AppScan Standard v10.6.0.28408 | [Download](https://pixeldrain.com/u/dq6kxyik) | | Nessus Professional v10.6.0 | [Download](https://pixeldrain.com/u/afUHRhXF) | ##### Linux | Tool | Link | | :--- | ---: | | Acunetix v25.1.250204093 | [Download](https://pixeldrain.com/u/CaagbhPL) | | Xray Pro v1.9.11 | [Download](https://pixeldrain.com/u/4m3c84ht) | | Nessus Professional v10.5.4 | [Download (BASH SCRIPT)](https://cyberarsenal.org/zen/nessus_debian_only_not_for_ubuntu_latest.sh) |

### 🕷️ Debugging / Decompilation Tools 🕷️ | Tool | Link | | :--- | ---: | | IDA v9.1_250226 Keygen | [Download](https://gofile.io/d/MOgQCb) |

# 📝 Notes 📝 ###### General Most of these tools are obtained from [CyberArsenal](https://cyberarsenal.org/) and [xss.is](https://xss.is/), credits for the cracks go to them. Everything is re-uploaded to gofile.io due to speed issues with the pwn3rzs CDN (presumably overloaded), including the removal of archive passwords (unless I suspect there is malware, in which case they're password protected) ###### Brute-Ratel This version is fully untested - no idea if it is broken or not. The xmodlib file is cleared every start-up, including a license check being present every time you start Brute-Ratel. Again, if it fails to compile the `badger.bin` payload into a executable, run the following:
`cat badger.bin | msfvenom -p - -f exe --platform win -a x64 -o badger.exe` ###### CraxsRat V6(?) High possibility of malware, run **strictly** in a virtual environment. I am not responsible for any damages caused to your host machine if you run it outside a VM. Archive password: `suspicious` ###### JexBot 1. Run `add_hosts.bat` **as Administrator** 2. Run `Jex_crack.exe` then `JEX BOT.exe` 3. Put `mastercho` as the user/password combo Note: After logging into jexbot you can close `Jex_crack.exe`, however you will need to run `Jex_crack.exe` every time you want to run jexbot. ###### Acunetix / Burp Suite The install scripts are untested for the latest versions. If required, open a issue and I'll update the scripts. ###### SpyNote I may not be re-uploading SpyNote due to it's **extreme** sketchiness.
I will *not* be responsible for possible machine infections due to uneducated users running mindlessly.
If you wish to contribute a safe, updated link, feel free to open an issue. ###### Xray For Windows:
Open a command prompt (or powershell if you prefer that), run scans as follows:
`xray.exe ws --browser http://testphp.vulnweb.com --json-output testphp.json --html-output testphp.html` For Linux:
Open a terminal, run scans as follows:
`./xray ws --browser http://testphp.vulnweb.com --html-output testphp.html` Without rad/chrome: `./xray ws --basic http://testphp.vulnweb.com --html-output testphp.html` Missing Chrome "fix" (for using xray+rad):
`sudo apt update`
`wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb`
`sudo apt install ./google-chrome-stable_current_amd64.deb`
Go to the launch script to insert `--no-sandbox` (e.g. `/opt/google/chrome/google-chrome`)
Last line of the file should look like this:
`exec -a "$0" "$HERE/chrome" --no-sandbox "$@"` ###### Invicti Professional 1. Import the registry file so the knowledgebase properly renders
2. Run `NetSparker.exe`
3. Optional: Disable telemetry, system proxy, enable dark mode, etc ###### HCL AppScan Standard **Make sure to replace the DLLs with the cracked ones** ###### To be added: - de4dot (pre-compiled) - AppSpider Full - HTTP Debugger Pro - Glasswire Elite - Anything suggested in the issues tab (Nothing, for now) ================================================ FILE: acunetix_installer_windows.bat ================================================ @REM Acunetix Windows installer script made by ixve for Red-Team-Tools echo off cls cls echo.&&echo. echo ^[0^/7^] Checking for Administrator rights... mkdir "%windir%\system32\test" 1>nul2>nul if "%errorlevel%" == "0" ( rmdir "%windir%\system32\test" & echo User is Administrator, continuing ) else ( echo User is not Administrator, please re-run script as admin. && pause && exit /b 1 ) cls echo.&&echo. echo ^[1^/7^] Adding entries to hosts file >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 erp.acunetix.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 erp.acunetix.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 erp.acunetix.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 erp.acunetix.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 discovery-service.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 discovery-service.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 discovery-service.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 discovery-service.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 cdn.pendo.io >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 cdn.pendo.io. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 cdn.pendo.io >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 cdn.pendo.io. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 bxss.me >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 bxss.me. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 bxss.me >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 bxss.me. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 jwtsigner.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 jwtsigner.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 jwtsigner.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 jwtsigner.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 sca.acunetix.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 sca.acunetix.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 sca.acunetix.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 sca.acunetix.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 192.178.49.174 telemetry.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 192.178.49.174 telemetry.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 2607:f8b0:402a:80a::200e telemetry.invicti.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 2607:f8b0:402a:80a::200e telemetry.invicti.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. cls echo.&&echo. echo ^[2^/7^] Running Acunetix installer, please make sure to install to the default directory. start /wait acunetix_25.8.250820089.exe 1>nul2>nul cls echo.&&echo. echo ^[3^/7^] Stopping Acunetix services net stop "Acunetix" 1>nul2>nul net stop "Acunetix Database" 1>nul2>nul cls echo.&&echo. echo ^[4^/7^] Removing wvsc file in default Acunetix install directory del "C:\Program Files (x86)\Acunetix\25.8.250820089\wvsc.exe" 1>nul2>nul echo Moving patched wvsc file to default Acunetix install directory move wvsc.exe "C:\Program Files (x86)\Acunetix\25.8.250820089\" 1>nul2>nul cls echo.&&echo. echo ^[5^/7^] Removing Acunetix license directory rmdir /s /q C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul echo Re-making Acunetix license directory mkdir C:\ProgramData\Acunetix\shared\license 1>nul2>nul echo Moving license_info.json and wa_data.dat to Acunetix license directory move license_info.json C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul move wa_data.dat C:\ProgramData\Acunetix\shared\license\ 1>nul2>nul echo Setting license_info.json and wa_data.dat as read-only attrib +r C:\ProgramData\Acunetix\shared\license\*.* /s cls echo.&&echo. echo ^[6^/7^] Re-starting Acunetix services net start "Acunetix" 1>nul2>nul net start "Acunetix Database" 1>nul2>nul cls echo.&&echo. echo ^[7^/7^] Opening Acunetix dashboard start https://127.0.0.1:3443 cls echo.&&echo. echo Work complete, enjoy your Acunetix install timeout 5 exit /b 1 ================================================ FILE: burpsuite_installer_windows.bat ================================================ echo off title B.S.I.H. cls echo Welcome to B.S.I.H. (Burp Suite Install Helper) echo. echo. REM Getting wget.exe using PowerShell "LOLBAS" (Alternative to BitsAdmin) echo Grabbing wget.exe via PowerShell. powershell -exec bypass -command "Import-Module BitsTransfer; Start-BitsTransfer 'https://hyperos-script-store.pages.dev/wget.exe' 'wget.exe'" cls REM Checking if user has a proper Java version installed :javacheck echo Do you have Java 17+ installed? echo [1] Yes echo [2] Check (Attempts to run "java -version") echo [0] No echo. choice /c 120 /n /m ">> " if %ERRORLEVEL%==1 cls if %ERRORLEVEL%==2 cls && start cmd /k "java -version && pause && exit" && goto javacheck if %ERRORLEVEL%==3 ( cls echo Downloading OpenJDK 21 wget.exe --no-check-certificate -q --show-progress -O OpenJDK.msi "https://github.com/adoptium/temurin21-binaries/releases/download/jdk-21.0.2+13/OpenJDK21U-jdk_x64_windows_hotspot_21.0.2_13.msi" echo. echo Installing OpenJDK msiexec /i OpenJDK.msi /qb! /l*v openjdk_install.log echo Done ) cls REM Grabbing Burp Suite from the official servers and installing with unattended mode echo Downloading Burp Suite wget.exe --no-check-certificate -q --show-progress -O BurpSuiteInstaller.exe "https://portswigger-cdn.net/burp/releases/download?product=pro&version=2023.12.1&type=WindowsX64" echo. echo Running installer BurpSuiteInstaller.exe -q -dir 'C:\Program Files\' -overwrite -nofilefailures -splash "Burp Suite Installer" -console REM Moving and running keygen cls echo Copying BurpLoaderKeygen.jar to installed folder copy BurpLoaderKeygen\BurpLoaderKeygen.jar "C:\Program Files\BurpSuitePro\" 1>nul2>nul echo Running BurpLoaderKeygen.jar start java -jar "C:\Program Files\BurpSuitePro\BurpLoaderKeygen.jar" REM User interaction required cls echo. echo. REM The blob below is just a warning sign, you can print it yourself in a seperate batch file if you don't trust me echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^!^!^!^!^!^!^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^:^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo ^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_ echo. echo. echo User interaction is required from this point on echo You will be guided from the console on what you have to do pause pause cls echo. echo. echo. echo 1. Run Burp Suite from the keygen by pressing the Run button echo. echo 2. Agree to the Burp Suite license agreement echo. echo 3. Copy the license from the keygen and paste it into the license text box located inside Burp Suite and press next echo. echo 4. Locate and press "Manual Activation", then press "Copy Request" echo. echo 5. Tab back into the keygen and paste the request into the text box on the right side echo. echo 6. Copy the activation resposne back into Burp Suite, then press Next -^> Finish -^> Next -^> Start Burp echo. echo 7. Enjoy. echo. echo. pause REM Add a starter to the Destkpo echo ^"C:\Program Files\BurpSuitePro\jre\bin\java.exe^" "--add-opens=java.desktop/javax.swing=ALL-UNNAMED" "--add-opens=java.base/java.lang=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm.tree=ALL-UNNAMED" "--add-opens=java.base/jdk.internal.org.objectweb.asm.Opcodes=ALL-UNNAMED" "-javaagent:C:/Program Files/BurpSuitePro/BurpLoaderKeygen.jar" "-noverify" "-jar" "C:\Program Files\BurpSuitePro\burpsuite_pro.jar" > %USERPROFILE%\Desktop\StartBurpSuite.bat REM Removing files that are no longer needed before exitting echo Deleting extra files del /q /f wget.exe 2>nul del /q /f BurpSuiteInstaller.exe 2>nul del /q /f .wget-hsts 2>nul del /q /f burpsuite_pro_windows-x64_v2023_12_1_error.log 2>nul echo Killing java.exe (BurpKeygenLoader.jar) taskkill /f /im java.exe 1>nul2>nul REM Finally, exit. echo Script finished, goodbye. exit /b 1 ================================================ FILE: hclappscan_installer_windows.bat ================================================ @REM Simple HCL AppScan installer - ixve @ github.com/ixve/red-team-tools echo off cls echo. echo [1/3] Installing HCL AppScan... start /wait "" HCL_AppScan.exe /S /v/qn 1>nul 2>nul cls echo. echo [2/3] Killing process... taskkill /F /IM AppScanGUI.exe /T 1>nul 2>nul cls echo. echo [3/3] Patching... xcopy /Y /I "crack\AppScanSDK.dll" "C:\Program Files (x86)\HCL\AppScan Standard\" 1>nul 2>nul xcopy /Y /I "crack\HclLicenseProvider.dll" "C:\Program Files (x86)\HCL\AppScan Standard\" 1>nul 2>nul echo.&&echo. echo Crack by Pwn3rzs - Zen echo Enjoy :3 timeout /T 3 exit ================================================ FILE: specterinsight_installer_windows.bat ================================================ @REM SpecterInsight C2 Install Script - ixve @ github.com/ixve/red-team-tools echo off setlocal enabledelayedexpansion cls echo. echo ^[1^/5^] cURL check where curl >nul 2>&1 if %ERRORLEVEL%==0 ( echo [OK] cURL installed ) else ( echo. echo [ERR] cURL missing mkdir %TEMP%\curl echo [1/3] Downloading... powershell -Command "Invoke-WebRequest -Uri 'https://curl.se/windows/dl-8.17.0_1/curl-8.17.0_1-win64-mingw.zip' -OutFile '%TEMP%\curl\curl.zip' -UseBasicParsing" 1>nul 2>nul echo [2/3] Extracting... powershell -Command "Expand-Archive -Path '%TEMP%\curl\curl.zip' -DestinationPath '%TEMP%\curl\' -Force" 1>nul 2>nul echo [3/3] Moving... xcopy /Y /I "%TEMP%\curl\curl-8.17.0_1-win64-mingw\bin\curl.exe" "%SYSTEMROOT%\System32\" 1>nul 2>nul xcopy /Y /I "%TEMP%\curl\curl-8.17.0_1-win64-mingw\bin\curl-ca-bundle.crt" "%SYSTEMROOT%\System32\" 1>nul 2>nul echo [OK] cURL installed rmdir /s /q %TEMP%\curl\ echo. ) cls echo. echo ^[2^/5^] Prerequisites check set POSTGRESQL_FOUND= set ASPNET_FOUND= set NETRUN_FOUND= for /f "tokens=*" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /r /c:"^Microsoft\.NETCore\.App 9\.0\.10 "' ) do ( set NETRUN_FOUND=1 ) for /f "tokens=*" %%r in ('dotnet --list-runtimes 2^>nul ^| findstr /i "Microsoft.AspNetCore.App"') do ( set ASPNET_FOUND=1 ) for /f "tokens=*" %%K in ('reg query "HKLM\SOFTWARE\PostgreSQL\Installations" 2^>nul') do ( set POSTGRESQL_FOUND=1 ) if defined NETRUN_FOUND ( echo [OK] .NET Runtime v9.0.10 installed ) else ( echo. echo [ERR] .NET Runtime v9.0.10 missing echo [1/2] Downloading installer... curl -k -L -s -o net-runtime.exe "https://builds.dotnet.microsoft.com/dotnet/Runtime/9.0.10/dotnet-runtime-9.0.10-win-x64.exe" echo [2/2] Installing... start /wait "" net-runtime.exe /quiet /norestart echo [OK] .NET Runtime v9.0.10 installed echo. ) if defined ASPNET_FOUND ( echo [OK] ASP.NET Core installed ) else ( echo. echo [ERR] ASP.NET Core missing echo [1/2] Downloading installer... curl -k -L -s -o aspnet-core.exe "https://builds.dotnet.microsoft.com/dotnet/aspnetcore/Runtime/9.0.10/aspnetcore-runtime-9.0.10-win-x64.exe" echo [2/2] Installing... start /wait "" aspnet-core.exe /quiet /norestart echo [OK] ASP.NET Core installed echo. ) if defined POSTGRESQL_FOUND ( echo [OK] PostgreSQL installed ) else ( echo. echo [ERR] PostgreSQL missing echo [1/2] Downloading installer... curl -k -O -s https://get.enterprisedb.com/postgresql/postgresql-18.0-2-windows-x64.exe echo [2/2] Installing ^(This might take a while^)... start /wait "" postgresql-18.0-2-windows-x64.exe --mode unattended --unattendedmodeui none --superpassword "postgres" echo [OK] PostgreSQL installed echo. ) cls echo. echo ^[3^/5^] Cleanup del net-runtime.exe 1>nul 2>nul del aspnet-core.exe 1>nul 2>nul del postgresql-18.0-2-windows-x64.exe 1>nul 2>nul cls echo. echo ^[4^/5^] Modifying HOSTS file >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 www.practicalsecurityanalytics.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 www.practicalsecurityanalytics.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 practicalsecurityanalytics.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo 127.0.0.1 practicalsecurityanalytics.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 www.practicalsecurityanalytics.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 www.practicalsecurityanalytics.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 practicalsecurityanalytics.com >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo ::1 practicalsecurityanalytics.com. >> "%SYSTEMROOT%\System32\drivers\etc\hosts" echo. cls echo. echo ^[5^/5^] Starting server and client start SpecterInsight\server\SpecterInsight.Server.Host.exe 1>nul 2>nul start SpecterInsight\client\SpecterInsight.UI.exe cls echo. echo. echo Work complete, enjoy ^:3 timeout /T 5 exit