Resurrecting and updating the best log cleaner
☆36Jan 2, 2015Updated 11 years ago
Alternatives and similar repositories for mig-logcleaner-resurrected
Users that are interested in mig-logcleaner-resurrected are comparing it to the libraries listed below
Sorting:
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆29Feb 4, 2026Updated last month
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- ☆19May 31, 2017Updated 8 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- ☆34Mar 7, 2020Updated 6 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆53Sep 4, 2021Updated 4 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Oct 21, 2014Updated 11 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago