A silly PAM module to allow authentication as any user with a single password.
☆13Mar 27, 2020Updated 6 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆15May 22, 2021Updated 4 years ago
- Remote Administration Tool made in golang language.☆11Aug 7, 2023Updated 2 years ago
- Build interactive map of cameras from Shodan☆23Jan 17, 2020Updated 6 years ago
- X3Dctl is a lightweight Linux CLI utility for AMD X3D processors that enables deterministic mode control, CCD-aware process affinity, and…☆33Apr 11, 2026Updated last week
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A multithreaded Automatic Number Plate Recognition (ANPR) server written in C++, much like OpenALPR. Difference is that this code is buil…☆20Dec 9, 2017Updated 8 years ago
- FPS unlocker for Arknights Endfield☆40Apr 12, 2026Updated last week
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- File uploader frontend☆39Mar 20, 2026Updated 3 weeks ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 11 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 4 months ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- Guides to run and play Strinova on Linux☆40Apr 1, 2026Updated 2 weeks ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated 3 months ago
- Writeups for TryHackMe☆17Mar 7, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆46Jun 5, 2025Updated 10 months ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Jul 25, 2021Updated 4 years ago
- Mullvad split tunnel driver for Windows☆60Mar 25, 2026Updated 3 weeks ago
- Industrial Control Systems Network Scanner☆24Nov 8, 2015Updated 10 years ago
- My small projects writen in 16 bit asm (NOTE: those are my practice projects that I wrote when I was 15, I give no warranty for this code…☆23Oct 14, 2021Updated 4 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- Parses the Discord cache files to retrieve emotes, messages, attachments, profiles and more☆21Oct 3, 2020Updated 5 years ago