The most small and fast solution to create a undetectable backdoor through the PAM module.
☆45Apr 13, 2018Updated 7 years ago
Alternatives and similar repositories for pambd
Users that are interested in pambd are comparing it to the libraries listed below
Sorting:
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- HTML Form generator from Go structs☆12Jul 6, 2018Updated 7 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- A port of the Python subprocess module to Lua☆17Nov 1, 2018Updated 7 years ago
- A ruby wrapper around the (not so nice) WeeChat API☆20Oct 14, 2016Updated 9 years ago
- Transforms the GH Archive into a Postgres database.☆23Apr 2, 2024Updated last year
- ☆16Jan 18, 2020Updated 6 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- An emacs client to http://ix.io pastebin☆21Nov 30, 2015Updated 10 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- "its like OAB in python because snake"☆16Feb 5, 2018Updated 8 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- Supervisor daemon and apps monitoring through Zabbix.☆14Sep 27, 2017Updated 8 years ago
- Map of yellow and blue shops in Hong Kong 黃藍地圖☆22Feb 8, 2026Updated last month
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- A collection of linux kernel modules that harden the kernel☆17Dec 28, 2015Updated 10 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Mar 13, 2025Updated 11 months ago
- CLI utility to read data from Ukrainian ePassport (Ukrainian ID) using NFC reader.☆21Aug 13, 2021Updated 4 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- POC on how to use WebAssembly binaries generated by the Go compiler in a non-web environment☆24Dec 18, 2018Updated 7 years ago
- A HackerNews Android App.☆11Feb 9, 2019Updated 7 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Aug 11, 2023Updated 2 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- A binary hardening system☆111Sep 30, 2023Updated 2 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- WeeChat IRC testing server.☆33Sep 26, 2025Updated 5 months ago
- Nefarious IRCu (Based on IRCu 2.10.12)☆42Jan 1, 2026Updated 2 months ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last week
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Get information client with getdatareport (Plugin)☆25Oct 18, 2016Updated 9 years ago