calebstewart / pam_sneakyView external linksLinks
A silly PAM module to allow authentication as any user with a single password.
☆62May 20, 2020Updated 5 years ago
Alternatives and similar repositories for pam_sneaky
Users that are interested in pam_sneaky are comparing it to the libraries listed below
Sorting:
- Python API for interacting with sigma rules.☆54Jul 1, 2022Updated 3 years ago
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- A Windows Tool to reboot system to UEFI Firmware UI A.K.A BIOS setup.☆15Aug 16, 2021Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- Fancy reverse and bind shell handler☆2,870Aug 9, 2024Updated last year
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 10 months ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆21Sep 18, 2023Updated 2 years ago
- yet another hidden LKM hunter☆31Sep 18, 2025Updated 4 months ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- PFSExtractor rewritten in Rust☆32Feb 14, 2025Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- CPL remote trigger☆43Dec 28, 2025Updated last month
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 3, 2026Updated last week
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Apr 7, 2023Updated 2 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- LD_PRELOAD rootkit☆138Feb 29, 2024Updated last year
- ☆42May 19, 2022Updated 3 years ago
- Time Management application, for the blog series in https://dotnetcorecentral.com/☆10Mar 19, 2018Updated 7 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆22Updated this week
- 一款记录任务时间的时间管理应用☆15Dec 29, 2025Updated last month
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Feb 8, 2018Updated 8 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆11Jul 4, 2018Updated 7 years ago
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- ☆12Oct 1, 2024Updated last year
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- 📈 A simple network bandwith monitor written in Python.☆14Aug 1, 2021Updated 4 years ago