covermyass
covermyass copied to clipboard
Post-exploitation tool to cover your tracks on a compromised machine (beta)
Nowadays it is used in main distros. Thanks!
The tool may not be able to find log files in all places. In such case, the user can specify additional paths to look at for log files. **Example** ```...
When dealing with a huge number of log files, it can be nice to be able to only read or overwrite relevant files. Files that weren't modified after a date...
Some users may find disturbing that the tool performs another analysis before actually overwriting the files. It may also take a long time to perform. A solution to this could...
Previously, we used to write random data to files by set of 1024 bytes. Which means that for a file of 4096 bytes, we perform 4 write operations to rewrite...