Framework for modeling and researching C2 communications for developing efficient filtering and detection logic
☆23Oct 24, 2024Updated last year
Alternatives and similar repositories for TheAllCommander
Users that are interested in TheAllCommander are comparing it to the libraries listed below
Sorting:
- ☆14Jul 9, 2024Updated last year
- Email-Recon-For-Linux☆12May 20, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 2 weeks ago
- ☆42Feb 18, 2025Updated last year
- Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...☆15Feb 28, 2026Updated last week
- ☆11Jul 18, 2018Updated 7 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- ☆10Jan 1, 2018Updated 8 years ago
- A python library for runtime validation and type checking of python values.☆10Aug 11, 2022Updated 3 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- ☆92May 15, 2024Updated last year
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated 2 months ago
- ☆12Aug 10, 2024Updated last year
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- ☆12Oct 22, 2023Updated 2 years ago
- ☆13Apr 17, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- This is a simple example of how to serve a DeepSeek model with Azure ML.☆10Feb 10, 2025Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆11Jun 25, 2024Updated last year
- ☆10Dec 19, 2024Updated last year
- ☆10Sep 20, 2020Updated 5 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- 🗓️ Nexters 22기 출출팀 당신의 한 주의 출석을 책임지는 웹 "위클리"☆10Mar 9, 2023Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- An open-source MCP implementation providing document management functionality☆17Apr 8, 2025Updated 11 months ago
- ☆11Apr 1, 2025Updated 11 months ago
- ☆11May 24, 2017Updated 8 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆115Aug 29, 2022Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Terraform Cloud Dynamic Credentials module as an IAM OIDC identity provider in AWS☆12Mar 2, 2026Updated last week
- 인하대학교 빅데이터 동아리 IBAS 웹☆12Feb 13, 2026Updated 3 weeks ago
- Browser inside Browser! Why? Because we can☆16Feb 20, 2026Updated 2 weeks ago
- Some benchmarks☆12Sep 19, 2019Updated 6 years ago
- Step-by-step guide on deploying a natural language processing machine learning model to the Azure platform and consuming it using Power A…☆15Jan 30, 2024Updated 2 years ago