calebstewart / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆62Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆210Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Just some things that have some cool uses☆114Updated 3 months ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- ☆67Updated 3 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆125Updated 3 years ago
- ☆48Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Miscellaneous scripts for pentesting☆219Updated 7 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆58Updated last year
- Simple HTTP listener for security testing☆116Updated 9 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- Tunneling and Port Forwarding Cheat Sheet☆158Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆45Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆108Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- A little utility to convert nmap xml results to markdown tables☆72Updated 3 years ago
- Templates for submissions☆82Updated last month
- Scripts featured in the book How to Hack Like a Legend☆147Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆336Updated 10 months ago
- ☆44Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated last month