calebstewart / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆62Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆60Updated 2 years ago
- ☆108Updated last year
- Tryhackme rooms & tools☆65Updated 5 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆219Updated last year
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆126Updated 3 years ago
- ☆67Updated 3 years ago
- Simple HTTP listener for security testing☆119Updated last year
- ☆48Updated 4 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- Just some things that have some cool uses☆114Updated 2 months ago
- ☆45Updated 2 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- OSCP notes, commands, tools, and more.☆109Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Tunneling and Port Forwarding Cheat Sheet☆162Updated 2 years ago
- Directory/File, DNS and VHost busting tool written in Go☆23Updated 5 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆130Updated 11 months ago
- A Python API for Hack the Box platform interaction☆64Updated 5 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Miscellaneous scripts for pentesting☆219Updated 7 years ago
- Bad scripts I made doing CTF's☆21Updated last year
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆150Updated 11 months ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago