parent
fce6b5e2cb
commit
1579133800
16
README.md
16
README.md
|
@ -1,9 +1,10 @@
|
|||
# covermyass #
|
||||
|
||||
[![Build status](https://github.com/sundowndev/covermyass/workflows/Go%20build/badge.svg)](https://github.com/sundowndev/covermyass/actions)
|
||||
[![Tag](https://img.shields.io/github/tag/SundownDEV/covermyass.svg)](https://github.com/sundowndev/covermyass/releases)
|
||||
[![build status](https://github.com/sundowndev/covermyass/workflows/Go%20build/badge.svg)](https://github.com/sundowndev/covermyass/actions)
|
||||
[![latest tag](https://img.shields.io/github/tag/SundownDEV/covermyass.svg)](https://github.com/sundowndev/covermyass/releases)
|
||||
[![Coverage Status](https://coveralls.io/repos/github/sundowndev/covermyass/badge.svg?branch=master)](https://coveralls.io/github/sundowndev/covermyass?branch=master)
|
||||
|
||||
Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the infected server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very expensive hardware probing to recover the data.
|
||||
Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the compromised server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very expensive hardware probing to recover the data.
|
||||
|
||||
### Current status ###
|
||||
|
||||
|
@ -78,21 +79,20 @@ Flags:
|
|||
|
||||
First, run an analysis. This will not erase anything.
|
||||
|
||||
```
|
||||
```bash
|
||||
covermyass
|
||||
```
|
||||
|
||||
When you acknowledged the results, erase those files.
|
||||
|
||||
```
|
||||
```bash
|
||||
covermyass --write
|
||||
```
|
||||
|
||||
Filter out some paths :
|
||||
|
||||
```
|
||||
covermyass -f '/foo/bar/*.log'
|
||||
covermyass -f '/foo/bar.log'
|
||||
```bash
|
||||
covermyass -f '/foo/**/*.log' -f '/bar/foo.log'
|
||||
```
|
||||
|
||||
### License ###
|
||||
|
|
Loading…
Reference in New Issue