Rug4lo / Log-Zapper
Log-Zapper is a linux and windows secure Log cleaner.
☆20Updated 10 months ago
Alternatives and similar repositories for Log-Zapper:
Users that are interested in Log-Zapper are comparing it to the libraries listed below
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 6 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- PowerShell Obfuscator☆171Updated 10 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 9 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆82Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- ☆21Updated 2 weeks ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated 11 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- ☆55Updated 11 months ago
- Tool for enumerating Active Directory environments☆46Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- ☆51Updated 2 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Inject RDPThief into memory with PowerShell.☆62Updated 3 months ago
- ☆60Updated 11 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆54Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- ☆26Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- ☆17Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆26Updated 5 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆14Updated last year
- ☆58Updated 6 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year