JohnHammond / pam_sneakyView external linksLinks
A silly PAM module to allow authentication as any user with a single password.
☆13Mar 27, 2020Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 5 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 4 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Algorithms of facial recognition through sketches☆13May 9, 2014Updated 11 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 9 months ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- This is an example of a project with continuous fuzzing integration☆11Jul 26, 2020Updated 5 years ago
- Convert to and from Xcode, iOS XLIFF files <-> CSV files.☆10May 24, 2017Updated 8 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Plugin for Magento versions: >2.0.6, 2.1, 2.2☆17Mar 19, 2021Updated 4 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Writeups for ECSC 2019 National Phase☆10Jun 5, 2019Updated 6 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 8 years ago
- PHP Wrapper for Yamaha MusicCast API☆10Sep 23, 2020Updated 5 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆16May 17, 2016Updated 9 years ago
- ☆16May 9, 2016Updated 9 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- LFI Exploitation Tool☆10Mar 26, 2017Updated 8 years ago
- ☆12Dec 30, 2020Updated 5 years ago