JohnHammond / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆12Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 5 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆32Updated 5 years ago
- ☆81Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- This reconissance tool is specific written for OSCP engagements.☆56Updated 2 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 4 years ago
- Simple python script for converting Nmap XML to csv (and xlsx)☆38Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆37Updated 5 years ago
- ☆150Updated last year
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆12Updated 9 years ago
- SANS Slingshot Linux Distribution☆51Updated 4 years ago
- CTFs as you need them☆27Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated last year
- ☆39Updated 10 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆54Updated 12 years ago
- Collection of useful scripts.☆78Updated 2 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 4 months ago
- ☆48Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆147Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Updated 6 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago