A silly PAM module to allow authentication as any user with a single password.
☆62May 20, 2020Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Baseline/Test for persistence in common Windows Registry locations☆23Jan 30, 2019Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 9 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fancy reverse and bind shell handler☆2,876Aug 9, 2024Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆25Mar 7, 2023Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Directory/File, DNS and VHost busting tool written in Go☆25Jan 3, 2020Updated 6 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated last year
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆10Oct 13, 2020Updated 5 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Learning FreeBSD Kernel Hacking - Exercises☆63Jun 2, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- ☆10Jun 19, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆160Jan 7, 2025Updated last year
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- Archive of talk materials.☆11Mar 2, 2023Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Low cost aerial surveillance drone☆19Apr 22, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Apr 15, 2022Updated 3 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 3 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Tactical Race Exploitation & Concurrency Orchestrator☆25Jan 4, 2026Updated 2 months ago
- ☆11Jan 8, 2024Updated 2 years ago
- A simple, intutive, feature rich, php web shell for pen testing.☆14Feb 4, 2020Updated 6 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago