A silly PAM module to allow authentication as any user with a single password.
☆62May 20, 2020Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A Windows Tool to reboot system to UEFI Firmware UI A.K.A BIOS setup.☆15Aug 16, 2021Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last week
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- ☆42May 19, 2022Updated 3 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- 一款记录任务时间的时间管理应用☆17Feb 27, 2026Updated last week
- A small guide to make recruiting a little easier.☆13Apr 3, 2023Updated 2 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- ☆11Feb 28, 2026Updated last week
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last month
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆27Updated this week