infinite-horizon219 / mig-logcleaner-resurrectedView external linksLinks
Resurrecting and updating the best log cleaner
☆36Jan 2, 2015Updated 11 years ago
Alternatives and similar repositories for mig-logcleaner-resurrected
Users that are interested in mig-logcleaner-resurrected are comparing it to the libraries listed below
Sorting:
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- fork from http://icmpshell.sourceforge.net☆15Nov 26, 2015Updated 10 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- A collection of post-exploitation tools for network red teaming.☆139Dec 7, 2018Updated 7 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Oct 21, 2014Updated 11 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago