x13a / pam-partyLinks
PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.
โ11Updated last year
Alternatives and similar repositories for pam-party
Users that are interested in pam-party are comparing it to the libraries listed below
Sorting:
- Simple Go Discord Botโ22Updated 2 years ago
- ๐งฎ SOCKS5/4/4a ๐พ validating proxy pool and upstream SOCKS5 server for ๐คฝ LOLXDsoRANDum connections ๐โ80Updated 9 months ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.โ25Updated 10 months ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumesโ17Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsโ52Updated last year
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hackโ43Updated 8 months ago
- Create self-contained, 1-click scripts, which connect any computer to your TailScale networkโ16Updated 2 years ago
- BusKill kill cord for Linuxโ35Updated 5 years ago
- Miranda UPNP Toolโ12Updated last year
- A network forensics and passive sniffer toolโ50Updated 3 weeks ago
- Binary and Static Releasesโ15Updated 2 weeks ago
- A guide to downloading all public DDoSecrets releases via torrentโ54Updated last year
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers ๐ฐ๏ธโ51Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.โ18Updated 3 years ago
- hostnames registration application for I2Pโ11Updated 2 years ago
- An SSH honeypot written entirely in Go.โ12Updated 6 months ago
- Analyse binaries for missing security features, information disclosure and more...โ86Updated last year
- GUI manager for network tunnels developed for Command and Control systems.โ11Updated 2 years ago
- Private and self-hosted file sharing over the Tor network written in golangโ118Updated last month
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashingโ13Updated last year
- Web browser for embedded systems.โ16Updated 2 years ago
- CA Issuers Monitor (Authority Info Access)โ14Updated 2 years ago
- A tool to encode and decode content as whitespaceโ17Updated last year
- CLI tool to quickly and efficiently bulk-download entries from a Certificate Transparency logโ37Updated last month
- Armory Drive - USB encrypted drive with mobile unlock over BLEโ73Updated 2 months ago
- An ๐ฆ orgasmic ๐ฆ Python library for the Docker Engine API ๐ฅตโ13Updated last year
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and controlโฆโ35Updated last year
- Linux kernel module to fight against police terrorโ29Updated 3 years ago
- Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.โ12Updated 4 years ago
- A bash script to automate Toyota tire pressure monitoring system testing via rtl_433.โ25Updated 3 years ago