calebstewart / pam_sneakyLinks
A silly PAM module to allow authentication as any user with a single password.
☆62Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆126Updated 3 years ago
- Simple HTTP listener for security testing☆119Updated last year
- ☆67Updated 3 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆61Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆222Updated last year
- ☆45Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- ☆48Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Just some things that have some cool uses☆114Updated 2 months ago
- Tunneling and Port Forwarding Cheat Sheet☆163Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- OSCP notes, commands, tools, and more.☆110Updated 3 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 8 months ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- My Favorite Offensive Security Scripts☆79Updated 8 months ago
- CTF toolbox☆21Updated 2 years ago
- ☆38Updated 4 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆152Updated 11 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆101Updated 8 months ago