calebstewart / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆55Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆31Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆33Updated 8 years ago
- Simple HTTP listener for security testing☆114Updated 6 months ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Updated 9 months ago
- ☆66Updated 3 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Just some things that have some cool uses☆111Updated last week
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Directory/File, DNS and VHost busting tool written in Go☆20Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆123Updated 2 years ago
- CTF toolbox☆22Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆77Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆77Updated last year
- OSCP notes, commands, tools, and more.☆101Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆55Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆203Updated 10 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 3 months ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- ☆85Updated 2 years ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- ☆102Updated last year
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago