Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security ssh
security
x
ssh
x
153 search results found
Teleport
⭐
15,729
Protect access to all of your infrastructure.
Yubikey Guide
⭐
10,680
Guide to using YubiKey for GnuPG and SSH
Secretive
⭐
6,717
Store SSH keys in the Secure Enclave
Certificates
⭐
5,887
🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
X11docker
⭐
5,193
Run GUI applications and desktops in docker and podman containers. Focus on security.
Cowrie
⭐
4,889
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Cli
⭐
3,403
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Ssh Audit
⭐
2,981
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Bless
⭐
2,725
Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function
Openssh Portable
⭐
2,652
Portable OpenSSH
Ssh Audit
⭐
2,553
SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Containerssh
⭐
2,504
ContainerSSH: Launch containers on demand
Kubernetes Security Best Practice
⭐
2,323
Kubernetes Security - Best Practice Guide
Stowaway
⭐
2,195
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Autovpn
⭐
1,855
Create On Demand Disposable OpenVPN Endpoints on AWS.
Sshportal
⭐
1,625
🎩 simple, fun and transparent SSH (and telnet) bastion server
Envoy
⭐
1,550
Elegant SSH tasks for PHP.
Ipban
⭐
1,411
Since 2011, IPBan is the worlds most trusted, free security software to block hackers and botnets. With both Windows and Linux support, IPBan has your dedicated or cloud server protected. Upgrade to IPBan Pro today and get a discount. Learn more at ↓
The Bastion
⭐
1,355
Authentication, authorization, traceability and auditability for SSH accesses.
Sshesame
⭐
1,263
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Hardening
⭐
1,252
Hardening Ubuntu. Systemd edition.
Ssh Mitm
⭐
1,176
SSH-MITM - ssh audits made simple
Xiringuito
⭐
1,001
SSH-based "VPN for poors"
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Security Growler
⭐
826
📡 A Mac menubar app that notifies you whenever SSH, VNC, sudo, or other auth events occur.
Totp Ssh Fluxer
⭐
786
Take security by obscurity to the next level (this is a bad idea, don't really use this please)
Ansible Role Security
⭐
734
Ansible Role - Security
Reverse Ssh
⭐
672
Statically-linked ssh server with reverse shell functionality for CTFs and such
Fatt
⭐
622
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Pi Timolo
⭐
534
Raspberry PI-TIMOLO ( PI-TImelapse, MOtion, LOwLight ) uses RPI picamera and OpenCV for Remote Headless Security Monitoring using Motion Tracking, Rclone Auto Sync files with remote storage services. Auto Twilight Transitions and Low Light Camera Settings. Panoramic images using PanTiltHat and More. This project is featured on GitHub Awesome software.
Ssh Auditor
⭐
523
The best way to scan for weak ssh passwords on your network
Cloudflare Ufw
⭐
521
Script to update UFW with Cloudflare IPs
Aker
⭐
514
SSH bastion/jump host/jumpserver
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Wbruter
⭐
497
wbruter was the first tool wich has been released as open source wich can guarantee 100% that your pin code will be cracked aslong as usb debugging has been enable. wbruter also includes some other brute methods like dictionary attacks for gmail, ftp, rar, zip and some other file extensions.
Putty Cac
⭐
411
Windows Secure Shell Client With Support For Smart Cards, Certificates, & FIDO Keys
Decoymini
⭐
390
🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Orbitaldump
⭐
380
A simple multi-threaded distributed SSH brute-forcing tool written in Python
Honeypot
⭐
373
Low interaction honeypot that displays real time attacks
Heralding
⭐
349
Credentials catching honeypot
Krypton Ios
⭐
339
DEPRECATED Krypton turns your iOS device into a WebAuthn/U2F Authenticator: strong, unphishable 2FA.
Wolfssh
⭐
328
wolfSSH is a small, fast, portable SSH implementation, including support for SCP and SFTP.
Freepass
⭐
310
[DEPRECATED] password manager thing
Elkarbackup
⭐
302
Open source backup solution for your network
Debian Privacy Server Guide
⭐
301
Guide to using a remote Debian server for security and privacy services
Gortr
⭐
297
The RPKI-to-Router server used at Cloudflare
Awesome Go Security
⭐
296
A dedicated place for cool golang security projects
Ssh Baseline
⭐
270
DevSec SSH Baseline - InSpec Profile
Ssh Tpm Agent
⭐
246
💻 🔑 ssh-agent for TPMs
Casvisor
⭐
238
An open-source security log auditing & RDP, VNC, SSH bastion platform, online demo: https://door.casvisor.com
Leaky Repo
⭐
196
Benchmarking repo for secrets scanning
Ssh Login Alert Telegram
⭐
171
Recieive telegram notfications when user connect to a server
Dheater
⭐
168
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
Chef Ssh Hardening
⭐
155
This chef cookbook provides secure ssh-client and ssh-server configurations.
Aws Ssm Ec2 Proxy Command
⭐
148
AWS SSM EC2 SSH Proxy Command
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Ansible Role Harden Linux
⭐
116
Ansible role for hardening Linux
5minutes
⭐
109
First 5 minutes on new servers. Secure your servers with single command - Ansible playbook
Tarssh
⭐
102
A simple SSH tarpit inspired by endlessh
Awa Ssh
⭐
101
Purely functional SSH library in ocaml.
Jail Shell
⭐
94
Jail-shell is a linux security tool mainly using chroot, namespaces technologies, limiting users to perform specific commands, and access sepcific directories.
Kerberos Docker
⭐
94
Run kerberos environment in docker containers
Windows Fido Bridge
⭐
91
An OpenSSH SK middleware that allows you to use a FIDO/U2F security key (e.g. a YubiKey) to SSH into a remote server from WSL or Cygwin.
Sshd_config
⭐
88
K4YT3X's Hardened OpenSSH Server Configuration
Security Camera
⭐
73
🔦 Motion detecting security camera using a raspberry pi, webcam, and slack
Certonid
⭐
73
Certonid is a Serverless SSH Certificate Authority
Werbot
⭐
67
🔑 Share access for teams - self-hosted solution for teams with single sign-on for easy, secure shared access to servers, databases or applications.
Rtrlib
⭐
66
An open-source C implementation of the RPKI/Router Protocol client
Signmykey
⭐
65
An automated SSH Certificate Authority
Sshkey Audit
⭐
65
Automate SSH key management
Ansible Secure Ssh
⭐
63
The ansible playbook to improve the security of your SSH
Ansible Role Ssh Chroot Jail
⭐
62
Ansible Role - SSH chroot jail config
Sshizzle
⭐
61
Serverless, Zero-Trust SSH for Microsoft Azure
Puwr
⭐
54
Pivot your way deeper into computer networks with SSH compromised machines.
Ubuntu Web Server Build Script
⭐
54
A hand-rolled shell script to help you get up and running quickly with an Ubuntu web server. Specifically geared for Ubuntu 10.04 LTS 32-bit. Please note: This is not intended to be a complete and comprehensive solution, but a starting point for your custom server.
Crypki
⭐
51
A simple service for interacting with an HSM or other PKCS#11 device.
Ssh Proxy
⭐
50
SSH proxy that allows support agents go to customers servers with using intermediate corporate SSH key
Ssham
⭐
45
SSH Access Manager
Let Me In
⭐
43
Simple web app for adding/removing EC2 ssh access to an IP
Vechain Core Nodes Security Checklist
⭐
43
VeChain core nodes security checklist(唯链核心节点安全执行指南)
Inet_ssh_dist
⭐
42
SSH distribution for erlang
Secrets Bridge
⭐
41
Secrets bridge - Secure build-time secrets injection for Docker
Fakessh
⭐
37
Fake SSH server for confusing spammers, because we all know security through obscurity rocks.
Ddos Mitigation
⭐
35
Tips to mitigate and secure your large-scale server against DDoS attacks.
Sshm
⭐
35
Easy connect on EC2 instances thanks to AWS System Manager Agent. Just use your `~/.aws/profile` to easily select the instance you want to connect on.
Security Checklist
⭐
34
Web application security checklist
Pfsense Pkg Zeek
⭐
32
Zeek (formerly Bro) Network Security Monitor package for pfSense router/firewall
Pssht
⭐
32
SSH server written in PHP
Ontology Triones Service Node Security Checklist
⭐
30
Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)
Sshdo
⭐
30
controls which commands may be executed via incoming ssh
Cornerstone
⭐
30
Linux命令转发记录
Pam_pwnd
⭐
29
A PAM module to test passwords against previous leaks at haveibeenpwned.com
Kube Apparmor Manager
⭐
29
Manage AppAmormor profiles for Kubernetes cluster
Touch2sudo
⭐
27
Two-factor authentication using Mac Touch ID for sudo over SSH
Scanssh
⭐
26
Fast SSH server and open proxy scanner
Terraform Aws Bastion Ssm Iam
⭐
26
AWS Bastion server which can reside in the private subnet utilizing Systems Manager Sessions
Meta Wolfssl
⭐
25
wolfSSL layer for OpenEmbedded and Yocto, containing product recipes, examples, and bbappend files.
K8s Idm Lab
⭐
22
Kubernetes Identity Management Lab
Sshdcc
⭐
21
OpenSSHd Security Config Checker
Dosh
⭐
21
DoSH - Docker SHell
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Shell Ssh (3,533)
Python Security (3,424)
Python Ssh (2,527)
Html Security (2,284)
Golang Security (1,316)
Docker Ssh (1,255)
Server Ssh (1,207)
1-100 of 153 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.