Resurrecting and updating the best log cleaner
☆36Jan 2, 2015Updated 11 years ago
Alternatives and similar repositories for mig-logcleaner-resurrected
Users that are interested in mig-logcleaner-resurrected are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- fork from http://icmpshell.sourceforge.net☆15Nov 26, 2015Updated 10 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆29Feb 4, 2026Updated 2 months ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- ☆19May 31, 2017Updated 8 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- ☆34Mar 7, 2020Updated 6 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆53Sep 4, 2021Updated 4 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- ☆10Jun 15, 2024Updated last year
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Jun 29, 2021Updated 4 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Oct 21, 2014Updated 11 years ago
- SSDG 基于Social规则的账号|密码|口令字典生成工具☆16Jan 10, 2025Updated last year
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago