calebstewart / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆55Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆210Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆124Updated 3 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Just some things that have some cool uses☆114Updated 2 months ago
- My Password Cracking Methodology☆82Updated 2 years ago
- Simple HTTP listener for security testing☆116Updated 8 months ago
- ☆104Updated last year
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 3 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆319Updated 3 months ago
- Tunneling and Port Forwarding Cheat Sheet☆154Updated 2 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆31Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- ☆48Updated 3 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆57Updated last year
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- ☆66Updated 3 years ago
- ☆45Updated last year
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 3 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- brute-forcing su for fun and possibly profit☆95Updated 6 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆159Updated last week
- Fork from @rsmudge/armitage☆133Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 9 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆189Updated 5 months ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆141Updated 7 months ago