x13a / pam-party
PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.
☆10Updated 10 months ago
Alternatives and similar repositories for pam-party:
Users that are interested in pam-party are comparing it to the libraries listed below
- Fuzz Network Traffic☆18Updated 3 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 11 months ago
- SSH into your headless Raspberry Pi from Bluetooth. bluetooth, bluetooth-low-energy, headless, raspberry-pi, raspberry-pi-zero-2-w, ssh, …☆1Updated last month
- masscan with exclusive excludes☆54Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- ☆13Updated 7 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆12Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Simple Go Discord Bot☆22Updated 2 years ago
- Web interface to mailing list archives☆13Updated 8 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆12Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆22Updated 2 years ago
- Local Privilege Escalation Miner☆26Updated 2 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Detect and remove the presence of canary tokens☆20Updated last year
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Binary and Static Releases☆14Updated this week
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆10Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆24Updated 2 years ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆26Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year