The most small and fast solution to create a undetectable backdoor through the PAM module.
☆45Apr 13, 2018Updated 7 years ago
Alternatives and similar repositories for pambd
Users that are interested in pambd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pam-backdoor allows you to login any account by your password if the box uses pam_unix or let me say /etc/passwd☆12May 3, 2013Updated 12 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Aug 11, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Yet Another Wordlists Repo☆129Jan 6, 2022Updated 4 years ago
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- VOIP Security Audit Framework☆109Jan 22, 2018Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Ansible Playbooks mainly for SmartOS Joyent/LX Zones☆11Feb 1, 2019Updated 7 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Network monitoring probe with plugins for anomaly detection☆12Sep 20, 2019Updated 6 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Simple standalone progress bar in C.☆12Jul 3, 2019Updated 6 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Native Powers Talk demos☆16Jan 30, 2026Updated last month
- ☆19Dec 30, 2023Updated 2 years ago
- Map of yellow and blue shops in Hong Kong 黃藍地圖☆23Mar 4, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A simple PHP extension for hooking eval()☆17Feb 23, 2017Updated 9 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Binary Memcached client for Go with SASL support☆34May 22, 2018Updated 7 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Scanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter☆12May 9, 2023Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- Small snippets of code we often find useful☆56Jun 25, 2015Updated 10 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Test and exploit for CVE-2017-12542☆91Apr 15, 2018Updated 7 years ago
- Experiments on Linux Assembly shellcodes injection☆13Nov 21, 2017Updated 8 years ago
- List of Azure CDN IP Addresses☆19Sep 21, 2025Updated 6 months ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago