Ralnoc / pam-python
pam_python is a PAM module that runs the Python interpreter, and so allows PAM modules to be written in Python.
☆22Updated 4 years ago
Related projects: ⓘ
- detects several virtualizations☆44Updated 8 years ago
- Simple DNS server for serving TXT records written in Python☆31Updated 2 years ago
- Abusing fts3_tokenizer☆10Updated 8 years ago
- Python pam module supporting py3 (py2 support still exists but is deprecated)☆110Updated 9 months ago
- A simple Linux TCP client-server proxy able to redirect all data from one address to another by preserving source IP address.☆17Updated 7 years ago
- Command line utility for parsing certificates☆59Updated 3 years ago
- ☆6Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- NSS and PAM modules for lookups using LDAP☆54Updated 3 weeks ago
- IP address parsing for humans.☆52Updated 6 months ago
- Minimalistic DNS logging tool☆42Updated 2 years ago
- Remote Installation System for Linux☆29Updated 15 years ago
- Mass deploy and update Suricata IDPS using Ansible IT automation platform☆9Updated 9 years ago
- LDAP server, client and utilities, using Twisted Python☆158Updated last month
- PAM script module will allow you to execute scripts during authorization, password changes and sessions. This is very handy if your curre…☆115Updated 2 years ago
- ☆13Updated 11 years ago
- Python script for privilege escalation for Python☆9Updated 4 years ago
- Historical Tracking of MAC Address Assignments☆30Updated this week
- Python library to interact with 28K public DNS servers around the world☆37Updated 4 years ago
- Initiate SSH tunnels in the background in python☆48Updated last year
- Linux Ebtables bindings☆23Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Containers with systemd-nspawn☆23Updated last year
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- Clean your RHEL 6.x COW, it's dirty☆8Updated 2 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- HTTP tunnel on top of aiohttp and asyncio☆31Updated 4 years ago
- D4 core software (server and sample sensor client)☆43Updated 8 months ago
- ☆27Updated 8 years ago
- ☆25Updated 5 years ago