JohnHammond / pam_sneaky
A silly PAM module to allow authentication as any user with a single password.
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for pam_sneaky
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 4 years ago
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- CTFs as you need them☆28Updated last year
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆36Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆15Updated 4 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆29Updated 5 years ago
- Hack. Sleep. Repeat☆22Updated last year
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- Generate common Reverse Shells for Pentesting☆39Updated 3 years ago
- Template project for Offensive Security Exam Documentation☆10Updated 4 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆16Updated last year
- ☆21Updated 6 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- A Python API for Hack the Box platform interaction☆63Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Empower your enumeration during OSCP☆36Updated 5 years ago
- Useful scripts for pen testing. Require modification to run☆12Updated 4 years ago
- ☆76Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago
- ☆24Updated 2 years ago
- ☆80Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- My pen testing notes☆52Updated last year
- ARCHIVED: Use 'peh' instead☆16Updated 3 years ago
- A command line tool to search AttackerKB.☆50Updated 3 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆140Updated 3 years ago