JohnHammond / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆13Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 5 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆68Updated 2 months ago
- Ansible playbooks to install various utility and security tools to localhost☆29Updated 6 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆33Updated 6 years ago
- A Python API for Hack the Box platform interaction☆64Updated 5 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆218Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆81Updated 5 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- An ongoing list of virtual cybersecurity conferences.☆121Updated 4 years ago
- a port made of honey for blocking people☆13Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆33Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆52Updated 12 years ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- ☆168Updated 2 years ago
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 4 years ago
- A curated list of hacking environments where you can train your cyber skills legally and safely☆38Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆12Updated 6 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆78Updated 5 months ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 10 months ago