Linux Log Cleaner (wtmp, utmp & lastlog)
☆22Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for pyLogCleaner
Users that are interested in pyLogCleaner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool / library for simplifying string obfuscation with xor.☆22Jul 10, 2024Updated last year
- Implementation of a Whois Server with a redis backend☆15Oct 31, 2010Updated 15 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- a simple log cleaner for Linux☆28Jan 7, 2018Updated 8 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆20Jan 2, 2013Updated 13 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 3 months ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- ☆21Mar 4, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- scripts used in my pentest work.☆44Jan 14, 2016Updated 10 years ago
- A tool for dumping wtmp files and patching wtmp records☆20Jul 20, 2019Updated 6 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆12Oct 11, 2020Updated 5 years ago
- 爱学习,爱上进,不同于其他xxqg刷题软件的一款自动刷题工具。☆23Dec 7, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Web Automation for Internet Explorer☆33Jun 1, 2014Updated 11 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆32Apr 29, 2017Updated 8 years ago
- A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction…☆49Dec 7, 2025Updated 4 months ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ipextract: IP shell tools for extraction of ip address, subnets, FQDN, port numbers, ...☆31Feb 22, 2014Updated 12 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Learning JAVA for Security☆34Jun 9, 2022Updated 3 years ago
- Create a minimal linux distro from scratch☆29Sep 16, 2025Updated 6 months ago
- My CTF Challenges☆22Oct 10, 2023Updated 2 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago