x13a / pam-party
PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.
☆9Updated 8 months ago
Alternatives and similar repositories for pam-party:
Users that are interested in pam-party are comparing it to the libraries listed below
- Binary and Static Releases☆13Updated 8 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆48Updated last year
- An improved firecfg written in python.☆17Updated 7 months ago
- Wi-Fi change state adapter.☆10Updated 2 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆13Updated 10 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 8 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆11Updated 5 months ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆13Updated this week
- Multithreaded password cracker for SHA1, SHA256, SHA384, SHA512, and MD5 hash functions, coded in C#. This tool allows you to test the st…☆9Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆19Updated 2 years ago
- Simplify the link between social and real identities☆10Updated 4 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Website for iLeakage: Browser-based Speculative Execution Attacks on Apple Devices.☆12Updated 5 months ago
- Simple Go Discord Bot☆21Updated last year
- USB connection trigger.☆9Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- Local Privilege Escalation Miner☆23Updated 2 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- Code used in blog posts☆33Updated 5 months ago
- Miranda UPNP Tool☆9Updated 8 months ago
- Fuzz Network Traffic☆15Updated 3 weeks ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago