Clear all your logs in [linux/windows] servers 🛡️
☆314Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for Log-killer
Users that are interested in Log-killer are comparing it to the libraries listed below
Sorting:
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆608Sep 7, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- Payload Generation Framework☆1,972Aug 21, 2024Updated last year
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- CVE-2018-8120 Windows LPE exploit☆500May 30, 2018Updated 7 years ago
- 甲方安全工程师必备,内部钓鱼系统☆230Jan 15, 2022Updated 4 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- 跟踪真实漏洞相关靶场环境搭建☆242Jul 19, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆982Aug 1, 2023Updated 2 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 weeks ago
- ☆99May 3, 2018Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Jul 20, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- HTTP Botnet☆915Oct 27, 2020Updated 5 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago