All Projects → Log Killer → Similar Projects or Alternatives

688 Open source projects that are alternatives of or similar to Log Killer

exo
A process manager & log viewer for dev
Stars: ✭ 296 (+17.46%)
Mutual labels:  logs
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-44.44%)
Mutual labels:  hacking
weblogic-logging-exporter
Export server logs from WebLogic Server in JSON format to Elasticsearch.
Stars: ✭ 19 (-92.46%)
Mutual labels:  logs
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (-75.4%)
Mutual labels:  hacking
narc
Small utility to watch log files and ship to syslog service.
Stars: ✭ 18 (-92.86%)
Mutual labels:  logs
Webmap
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-25.4%)
Mutual labels:  hacking
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-85.71%)
Mutual labels:  web-security
Fluentd Kubernetes Sumologic
FluentD plugin to extract logs from Kubernetes clusters, enrich and ship to Sumo logic.
Stars: ✭ 61 (-75.79%)
Mutual labels:  logs
syncr
A rolling, append-only, local and remote data stream library for Go
Stars: ✭ 16 (-93.65%)
Mutual labels:  logs
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-46.43%)
Mutual labels:  hacking
shellsum
A defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-88.1%)
Mutual labels:  web-security
Pyhawk
Searches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-76.19%)
Mutual labels:  hacking
Learning-Node.js-Security
A Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-90.08%)
Mutual labels:  web-security
Brutedum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-15.87%)
Mutual labels:  hacking
aws-cloudformation-resource-providers-logs
The CloudFormation Resource Provider Package For Amazon CloudWatch Logs
Stars: ✭ 25 (-90.08%)
Mutual labels:  logs
Hackphiles
BruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-77.38%)
Mutual labels:  hacking
k2hftfuse
File transaction by FUSE-based file system
Stars: ✭ 30 (-88.1%)
Mutual labels:  logs
Openvehiclediag
A rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-46.43%)
Mutual labels:  hacking
PIL-RCE-Ghostscript-CVE-2018-16509
PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509
Stars: ✭ 44 (-82.54%)
Mutual labels:  web-security
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-77.38%)
Mutual labels:  hacking
requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (+28.17%)
Mutual labels:  web-security
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-26.19%)
Mutual labels:  hacking
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+73.81%)
Mutual labels:  web-security
Ios Sdk
AppSpector is a debugging service for mobile apps
Stars: ✭ 56 (-77.78%)
Mutual labels:  logs
ptkdev-logger
🦒 Beautiful Logger for Node.js: the best alternative to the console.log statement
Stars: ✭ 117 (-53.57%)
Mutual labels:  logs
Arduino Fastled Music Visualizer
An Arduino based music visualizer using the FastLED library and a strip of individually addressable LEDs
Stars: ✭ 134 (-46.83%)
Mutual labels:  hacking
PoShLog
🔩 PoShLog is PowerShell cross-platform logging module. It allows you to log structured event data into console, file and much more places easily. It's built upon great C# logging library Serilog - https://serilog.net/
Stars: ✭ 108 (-57.14%)
Mutual labels:  logs
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+325.79%)
Mutual labels:  hacking
geostat
GeoStat, Python script for parsing Nginx and Apache logs files and getting GEO data from incoming IP's.
Stars: ✭ 50 (-80.16%)
Mutual labels:  logs
Thechoice
The linux choice collection tools
Stars: ✭ 245 (-2.78%)
Mutual labels:  hacking
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (+75.4%)
Mutual labels:  logs
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-78.97%)
Mutual labels:  hacking
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-46.83%)
Mutual labels:  hacking
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+51.59%)
Mutual labels:  hacking
Mimir
📱 A simple & efficient iOS logging framework for high usage apps
Stars: ✭ 13 (-94.84%)
Mutual labels:  logs
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-79.37%)
Mutual labels:  hacking
cli-eaa
CLI for Enterprise Application Access (EAA)
Stars: ✭ 19 (-92.46%)
Mutual labels:  logs
Andrax Mobile Pentest
ANDRAX The first and unique Penetration Testing platform for Android smartphones
Stars: ✭ 394 (+56.35%)
Mutual labels:  hacking
android-sdk
AppSpector is a debugging service for mobile apps
Stars: ✭ 39 (-84.52%)
Mutual labels:  logs
Serverless Es Logs
A Serverless plugin to transport logs to ElasticSearch
Stars: ✭ 51 (-79.76%)
Mutual labels:  logs
pg sampletolog
Postgres extension to sample statements or transactions to logs
Stars: ✭ 17 (-93.25%)
Mutual labels:  logs
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-48.02%)
Mutual labels:  hacking
ink
A Logger backend that logs JSON
Stars: ✭ 64 (-74.6%)
Mutual labels:  logs
Pythem
pentest framework
Stars: ✭ 1,060 (+320.63%)
Mutual labels:  hacking
guardrails
guardrails.cs.virginia.edu
Stars: ✭ 18 (-92.86%)
Mutual labels:  web-security
Tool X
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Stars: ✭ 3,361 (+1233.73%)
Mutual labels:  hacking
CJ2018-Final-CTF
Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.
Stars: ✭ 58 (-76.98%)
Mutual labels:  web-security
Dockerscan
Docker security analysis & hacking tools
Stars: ✭ 1,046 (+315.08%)
Mutual labels:  hacking
winevt
Windows Event Interactions in Python
Stars: ✭ 59 (-76.59%)
Mutual labels:  logs
Threadboat
Program Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-47.62%)
Mutual labels:  hacking
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-82.54%)
Mutual labels:  hacking
Kalimux
Install And Use Kali Linux With Gui In Termux
Stars: ✭ 240 (-4.76%)
Mutual labels:  hacking
Raptor waf
Raptor - WAF - Web application firewall using DFA [ Current version ] - Beta
Stars: ✭ 246 (-2.38%)
Mutual labels:  hacking
Hatch
Hatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (-3.97%)
Mutual labels:  hacking
Bugbountyscanner
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
Stars: ✭ 229 (-9.13%)
Mutual labels:  hacking
Goat
🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-13.49%)
Mutual labels:  hacking
Asu
facebook hacking toolkit
Stars: ✭ 197 (-21.83%)
Mutual labels:  hacking
Instagram Hacker
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-38.1%)
Mutual labels:  hacking
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-65.48%)
Mutual labels:  hacking
Lookyloo
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Stars: ✭ 381 (+51.19%)
Mutual labels:  web-security
601-660 of 688 similar projects