Log-Zapper is a linux and windows secure Log cleaner.
☆22Jun 15, 2024Updated last year
Alternatives and similar repositories for Log-Zapper
Users that are interested in Log-Zapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated last year
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆29May 10, 2024Updated 2 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 4 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆13Jun 14, 2024Updated last year
- ☆27Apr 24, 2025Updated last year
- version 0.5.8☆18Jul 13, 2021Updated 4 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 5 years ago
- A simple Bash Script to Bypass Spotify Ads.☆10Jul 7, 2021Updated 4 years ago
- ☆15Jan 2, 2026Updated 4 months ago
- ☆28May 14, 2025Updated last year
- ☆12Oct 9, 2022Updated 3 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- 收集整理公开的子域名字典☆19Jun 3, 2024Updated last year
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆82Sep 15, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆20Apr 30, 2025Updated last year
- ☆93May 1, 2026Updated 2 weeks ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 5 months ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- A cross site scripting command and control notification server☆23Apr 13, 2026Updated last month
- IP address filter by City☆12Jan 17, 2025Updated last year
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- Want to know more about Privacy & Security, you will find mnay helpful Subject Matter Experts as-well-as the resources they use.☆20Apr 20, 2025Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago