Showing 14 open source projects for "python ssh"

View related business solutions
  • Top Corporate LMS for Training | Best Learning Management Software Icon
    Top Corporate LMS for Training | Best Learning Management Software

    Deliver and Track Online Training and Stay Compliant - with Axis LMS!

    Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
    Learn More
  • Project Planning and Management Software | Planview Icon
    Project Planning and Management Software | Planview

    Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.

    Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
    Learn More
  • 1
    SSH-MITM

    SSH-MITM

    Server for security audits supporting public key authentication

    ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in the middle SSH Server for security audits and malware analysis. Password and publickey authentication are supported and SSH-MITM is able to detect, if a user is able to login with publickey authentication on the remote server. This allows SSH-MITM to accept the same key as the destination server. If publickey authentication is not...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    RemoteSploit

    RemoteSploit

    Automated exploitation tool for SSH and RDP

    Automated exploitation tool for SSH and RDP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud. Icon
    Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.

    Power faster innovation with Teradata VantageCloud

    VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
    Learn More
  • 5
    lshell is a shell coded in Python, that lets you restrict a user's environment to limited sets of commands, choose to enable/disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user's commands, implement timing restriction, and more.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    Bifrozt

    Bifrozt

    High interaction honeypot solution for Linux based systems

    NOTICE: The format of this project has been changed from ISO to using ansible and has been moved to GitHub. Github link: https://github.com/Bifrozt/bifrozt-ansible
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    privacyidea

    privacyidea

    two factor authentication management system

    privacyIDEA is a management and authentication system for two factor authentication. You can use OTP tokens, OTP cards, SMS, Smartphone Apps to incorparte the second factor. It can even manage SSH keys and supports Offline OTP. The latest version can manage and enroll user certificates. Its modular design makes it easily enhancable. It runs on Linux. Applications and workflows can be connected to privacyIDEA hence enabling two factor authentication in your system logon, web...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    X-Crack Full

    X-Crack Full

    The best SSH penetration testing tool ever!

    X-Crack Full is an SSH penetration testing tool. It is coded in Python.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Python sniffer that identifies interactive SSH sessions. It detects when an intruder uses SSH with: a wrong password, a good one or with a password cracking program. It uses two techniques: SSH client's banner identification and SSH session total by
    Downloads: 0 This Week
    Last Update:
    See Project
  • Empowering Companies To Excel In Safety Data Sheet Compliance Icon
    Empowering Companies To Excel In Safety Data Sheet Compliance

    For any organization using chemicals that require Safety Data Sheets

    Effortless setup and maintenance: Simplified management and seamless online access to safety data sheets for your team
    Learn More
  • 10
    voidssh
    ssh bruteforce authentification with multiprocessing, string generator and dictionary attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SME Server

    SME Server

    The Koozali SME Server is a simple and robust server gateway for SOHO

    The Koozali SME Server is the open source community side of the original e-smith server. SME Server consists of a modified Red Hat / CentOS Linux installation, together with a number of server applications as well as the server management web panel. Its strengths are its ease to use for anyone able to use a web interface, and its robustness, giving the ability to recover its initial state even after any upgrade. The server is designed for Small Offices and Home Offices to act as a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A daemon that creates realtime dynamic, expirable iptables rules to block/drop IP addresses attempting brute-force breakin attacks on a linux host via ssh or other mechanism. Highly customizable and extensible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A Python/GTK+ based GUI for managing ssh tunnels. Aims to be as simple as possible and provide hints and help where adequate, to bring tunneling technolgy to non-techies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB