x13a / pam-partyLinks
PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.
β13Updated last year
Alternatives and similar repositories for pam-party
Users that are interested in pam-party are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentialsβ54Updated 2 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers π°οΈβ50Updated 2 years ago
- BusKill kill cord for Linuxβ35Updated 5 years ago
- β34Updated 9 months ago
- hostnames registration application for I2Pβ11Updated 3 years ago
- Simple Go Discord Botβ23Updated 2 years ago
- SnailLoad Demo Webserverβ37Updated 8 months ago
- π₯Έ Experimental p2p gossip network for OpenPGP signature transparency π₯Έβ34Updated last week
- A tool to encode and decode content as whitespaceβ18Updated 2 years ago
- All the microcodes, but packaged!β44Updated last week
- β10Updated 3 years ago
- An ARP/NDP swiss army knife to make MAC going nuts on networks around!β16Updated last year
- Binary and Static Releasesβ15Updated 2 weeks ago
- Network Traffic Fuzzerβ18Updated 9 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLEβ75Updated last month
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.β28Updated last year
- Signing-key abuse and update exploitation frameworkβ130Updated 4 months ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolisβ40Updated last year
- A network forensics and passive sniffer toolβ50Updated last month
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hackβ45Updated 10 months ago
- π A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.β22Updated 3 weeks ago
- IVRE's fork of the famous TCP port scanner. See below for details.β40Updated 8 months ago
- An SSH honeypot written entirely in Go.β12Updated 2 weeks ago
- Traffic analysis resistant messaging with Gio based user interfaceβ17Updated 3 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).β52Updated 4 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumesβ17Updated 5 years ago
- Private and self-hosted file sharing over the Tor network written in golangβ119Updated 3 months ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and controlβ¦β35Updated last year
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)β31Updated 6 months ago
- Global Socket Serverβ36Updated 2 weeks ago