shipcod3 / TuxLogCleanerLinks
a simple log cleaner for Linux
☆28Updated 8 years ago
Alternatives and similar repositories for TuxLogCleaner
Users that are interested in TuxLogCleaner are comparing it to the libraries listed below
Sorting:
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 8 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- ☆35Updated 9 years ago
- MS17-010☆63Updated 8 years ago
- ☆99Updated 7 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- MS17-010 exploits, payloads, and scanners☆97Updated 8 years ago
- Port of eternal blue exploits to powershell☆151Updated 8 years ago
- Some works on Nmap Scripts (NSE)☆89Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆174Updated 8 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 8 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆57Updated 4 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- Custom THP Dropper☆26Updated 7 years ago
- General Scripts to help with various types of SQL Injection☆30Updated 12 years ago
- CVE-2018-10933 very simple POC☆126Updated 7 years ago
- Mimipenguin密码抓取神器☆26Updated 8 years ago
- some pentest scripts & tools by yaseng@uauc.net☆148Updated 5 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 9 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago