Two Factor Authentication web portal written in PHP
☆132Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for TwoFactorAuth
Users that are interested in TwoFactorAuth are comparing it to the libraries listed below
Sorting:
- Terraform resources that can configure F5 BIGIP products☆17Aug 25, 2020Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Terraform module to create ARO cluster on MS Azure☆11Oct 12, 2022Updated 3 years ago
- Synchronization objects☆19Jul 5, 2024Updated last year
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- A CRUD-Application for managing WireGuard peers (e.g. for dynamic peer management) - WiP☆13Jun 20, 2018Updated 7 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Aug 29, 2015Updated 10 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- 2FA NGINX + Lua auth portal☆16Jan 16, 2018Updated 8 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- Centralized location to share study group notes.☆17Sep 25, 2019Updated 6 years ago
- Puppet module for automating the configuration of Citrix Netscaler devices☆16Jul 3, 2018Updated 7 years ago
- Monitoring plugin to check Docker / Kubernetes clusters managed by Rancher 2.x☆25Jun 13, 2025Updated 8 months ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 7 months ago
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- Visual Studio Code extension for MITRE ATT&CK☆56Jul 3, 2024Updated last year
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- An opinionated, integrated, extendable Puppet infrastructure module.☆24Jun 18, 2025Updated 8 months ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Jun 20, 2016Updated 9 years ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A continuation of Reliable SSH Tunnel, to set up and maintain persistent SSH (reverse) tunnels like autossh☆35Apr 15, 2025Updated 10 months ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- Deploy scikit-learn models to a REST API using Docker☆10May 1, 2023Updated 2 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- PowerShell module that provides some functionality to facilitate automating backup actions of a FortiGate device over SSH. This module al…☆10Feb 10, 2021Updated 5 years ago
- ☆10Feb 25, 2021Updated 5 years ago