A command and control (C2) server
☆58Jul 5, 2024Updated last year
Alternatives and similar repositories for Commander
Users that are interested in Commander are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated this week
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- ☆27Nov 24, 2024Updated last year
- ☆18Oct 28, 2025Updated 4 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- ☆18Jan 9, 2025Updated last year
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- maldev obviously☆28May 5, 2025Updated 10 months ago
- ☆23Jul 3, 2020Updated 5 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- 👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.☆13Sep 15, 2024Updated last year
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Frre gift card generator for Netfli. EBay, Amazon, ITunes, PayPal, Visa, PlaySation, Xbox and PlayStore☆32Aug 12, 2024Updated last year