All Projects → Ekultek → soapy

Ekultek / soapy

Licence: other
log file scrubber

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to soapy

ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+2512.5%)
Mutual labels:  post-exploitation
OffensiveAutoIt
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+2031.25%)
Mutual labels:  post-exploitation
Powerexploit
Post-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (+62.5%)
Mutual labels:  post-exploitation
BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-18.75%)
Mutual labels:  post-exploitation
XENA
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+693.75%)
Mutual labels:  post-exploitation
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (+131.25%)
Mutual labels:  post-exploitation
AlanFramework
A C2 post-exploitation framework
Stars: ✭ 405 (+2431.25%)
Mutual labels:  post-exploitation
mOrc
mOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (+0%)
Mutual labels:  post-exploitation
MacOS-WPA-PSK
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (+81.25%)
Mutual labels:  post-exploitation
presentations
My Presentations in PDF
Stars: ✭ 27 (+68.75%)
Mutual labels:  post-exploitation
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+3656.25%)
Mutual labels:  post-exploitation
sudo sniff
Steal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (+62.5%)
Mutual labels:  post-exploitation
SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (+43.75%)
Mutual labels:  post-exploitation
AIX-for-Penetration-Testers
A basic AIX enumeration guide for penetration testers/red teamers
Stars: ✭ 31 (+93.75%)
Mutual labels:  post-exploitation
AdbNet
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (+600%)
Mutual labels:  post-exploitation
ToRat client
This is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (+81.25%)
Mutual labels:  post-exploitation
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+193.75%)
Mutual labels:  post-exploitation
redpill
Assist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (+787.5%)
Mutual labels:  post-exploitation
dfex
DNS File EXfiltration
Stars: ✭ 46 (+187.5%)
Mutual labels:  post-exploitation
BackToMe
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (+281.25%)
Mutual labels:  post-exploitation
As mentioned at the HOPE conference 2018

This repo is apart of the warmind project for a clone of the code see here or you can get the code from here. For a version you can download with curl/wget see here.

Scenario

Post exploitation tools are far and in between, they are used after you have successfully exploited a system and need to either;

  • Do some things, pull hashes, ip addresses, etc.
  • Map the network
  • Anything that has to do with being on the network itself that you don't want to be caught doing

What soa.py does is create a sort of container that will host a root terminal shell while the log files are being monitored (default logs: /var/log). After you have completed your session, the log files are scrubbed back to the second soa.py was launched.

Commands

Soapy has a few available commands for you to pass:

usage: sudo soa.py [-n|-l|-d] PATH|DIR1 DIR2 ...

optional arguments:
  -h, --help            show this help message and exit
  -l PATH, --log PATH   pass the path to log files (*default=/var/log)
  -d DIR1 DIR2 ... [DIR1 DIR2 ... ...], --dirs DIR1 DIR2 ... [DIR1 DIR2 ... ...]
                        provide directories that you want files deleted out of
                        afterwards (*default=None)
  -n, --no-prompt       delete the files in the provided directory without
                        prompting for deletion (*default=raw_input)

Demo video

soapdemo

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].