Clear all your logs in [linux/windows] servers 🛡️
☆314Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for Log-killer
Users that are interested in Log-killer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆607Sep 7, 2018Updated 7 years ago
- Web application backdoor builder☆76Jun 9, 2021Updated 4 years ago
- CVE-2018-8120 Windows LPE exploit☆501May 30, 2018Updated 7 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- 甲方安全工程师必备,内部钓鱼系统☆230Jan 15, 2022Updated 4 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- 跟踪真实漏洞相关靶场环境搭建☆242Jul 19, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆989Aug 1, 2023Updated 2 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- wordpress hash cracker .☆65Sep 7, 2021Updated 4 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- 整理收集Struts2漏洞环境☆270Jan 9, 2018Updated 8 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- PHP 白盒分析工具,结合AST 和数据流跟踪分析代码,达到自动化白盒审计功能☆148May 14, 2018Updated 7 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆420Jan 17, 2019Updated 7 years ago