JohnHammond / pam_sneaky
A silly PAM module to allow authentication as any user with a single password.
☆12Updated 4 years ago
Alternatives and similar repositories for pam_sneaky:
Users that are interested in pam_sneaky are comparing it to the libraries listed below
- PowerSploit - A PowerShell Post-Exploitation Framework☆15Updated 4 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 4 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 3 years ago
- ☆80Updated 4 years ago
- CTFs as you need them☆28Updated last year
- Generate common Reverse Shells for Pentesting☆40Updated 3 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- Empower your enumeration during OSCP☆35Updated 6 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated last year
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- My pen testing notes☆53Updated last year
- MayorSec DNS Enumeration Tool☆82Updated 2 months ago
- Your go-to resource for all things OSINT☆162Updated 10 months ago
- List of Awesome Red Teaming Resources☆106Updated 6 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- ☆43Updated 8 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆74Updated 2 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated last year
- ☆21Updated 6 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year