matt-handy / TheAllCommanderView external linksLinks
Framework for modeling and researching C2 communications for developing efficient filtering and detection logic
☆23Oct 24, 2024Updated last year
Alternatives and similar repositories for TheAllCommander
Users that are interested in TheAllCommander are comparing it to the libraries listed below
Sorting:
- Email-Recon-For-Linux☆12May 20, 2022Updated 3 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 9 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- E-Commerce Clothing Shop Website! This project is a dynamic and user-friendly online store created using WordPress, designed to offer a s…☆10Aug 10, 2024Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Oct 8, 2024Updated last year
- Cybersecurity Psychology Framework☆19Updated this week
- ☆42Feb 18, 2025Updated 11 months ago
- Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...☆14Updated this week
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- A python library for runtime validation and type checking of python values.☆10Aug 11, 2022Updated 3 years ago
- ☆10Jan 1, 2018Updated 8 years ago
- ☆11Jul 18, 2018Updated 7 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- ☆92May 15, 2024Updated last year
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- This is a simple example of how to serve a DeepSeek model with Azure ML.☆10Feb 10, 2025Updated last year
- ☆11Oct 22, 2023Updated 2 years ago
- An open-source MCP implementation providing document management functionality☆16Apr 8, 2025Updated 10 months ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆15Nov 24, 2023Updated 2 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- I was bored and made this☆11Mar 22, 2021Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆10Apr 1, 2025Updated 10 months ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- uses esbuild-wasm to compile code written in the browser and display the output☆10May 23, 2021Updated 4 years ago
- IBM AIX 4.1.3 source code☆16Oct 12, 2021Updated 4 years ago
- ☆10Dec 19, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated last year
- ☆13Apr 17, 2024Updated last year
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆113Aug 29, 2022Updated 3 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year