log file scrubber
☆15Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for soapy
Users that are interested in soapy are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Automatically "block" people in images (like Black Mirror) using a pretrained neural network.☆23Mar 31, 2018Updated 7 years ago
- Debian live build for the Pocket-Kali☆41May 16, 2018Updated 7 years ago
- Become a Github Rockstar in less than 10 seconds☆19Mar 18, 2023Updated 2 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- 5-72 is an ambitious open-source project aimed to involve novice musicians into the craft of sound engineering. Using the buses of world-…☆12Aug 26, 2025Updated 6 months ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- Stockfish Engine OEX is a collection of compiled Stockfish engines . You need an Android chess application compatible with the Open Excha…☆10Sep 3, 2021Updated 4 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- A Postgres migrations tool with an emphasis on safety and transparency☆10Jun 1, 2021Updated 4 years ago
- This package includes Artisan Commands to create directory structure.☆10Mar 26, 2022Updated 3 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Feb 23, 2026Updated last week
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- An ARP Poisoning Defender script☆42Jun 25, 2018Updated 7 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- Scan for AirTag MACs and Payloads without the need for an Android device or nrfConnect.☆16Oct 13, 2025Updated 4 months ago