Showing 22 open source projects for "ssh ramdisk tool"

View related business solutions
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 1
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    ...Bruteforce support for Spotify accounts, Instagram accounts, ssh servers, Microsoft RDP clients and Gmail accounts. Emagnet is a very powerful tool for capturing email addresses and passwords from leaked databases uploaded on Pastebin. It's almost impossible to find leaked passwords after they're removed from the list on pastebin.com. Either they have been deleted by Pastebin's techs or the upload is just one in the crowd.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin,...
    Downloads: 87 This Week
    Last Update:
    See Project
  • 3
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    Deepfence SecretScanner can find unprotected secrets in container images or file systems. Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4

    X509 GUI Certificate Viewer

    Display online (TLS, DTLS, OPC, QUIC, SMTP) & offline certificates

    Downloads: 16 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 5

    System Hardening Benchmark

    System Hardening Compliance Auditor

    This tool simulates a security compliance audit, checking system configurations against a defined benchmark (e.g., DISA STIG or CIS).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 164 This Week
    Last Update:
    See Project
  • 7
    yubikey-agent

    yubikey-agent

    yubikey-agent is a seamless ssh-agent for YubiKeys

    ...Setup is simple, one command and one environment variable, and then the agent just runs in the background. Because it uses pure Go and leverages libraries like go-piv/piv-go and golang it works across platforms and integrates cleanly into SSH workflows. For developers or administrators who prioritize hardware-based SSH key security, this tool lowers the friction of using secure tokens in day-to-day SSH workflows. It also supports modern best practices in SSH authentication and brings stronger guarantees of key security in a user-friendly interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    RemoteSploit

    RemoteSploit

    Automated exploitation tool for SSH and RDP

    Automated exploitation tool for SSH and RDP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard the warning and continue on. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • 10
    Simple Keyring In Perl (Skip)

    Simple Keyring In Perl (Skip)

    Skip is a lightweight and portable tool for managing/using secrets

    Skip is a lightweight and portable tool for managing secrets such as login passwords and easily automating the programs that use them without leaving the secrets unencrypted on disk. Skip has been tested successfully with several common programs including fetchmail, getmail, msmtp, scp, ssh, and ssh-add without the need for any modification on Linux, OSX, and Windows under Cygwin.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PAC Manager
    PAC is a Perl/GTK replacement for SecureCRT/Putty/etc (linux ssh/telnet/... gui)... It provides a GUI to configure connections: users, passwords, EXPECT regular expressions, macros, etc. You like 'SecureCRT/SSHMenu'? Check this tool and let me know
    Leader badge
    Downloads: 178 This Week
    Last Update:
    See Project
  • 12
    privacyidea

    privacyidea

    two factor authentication management system

    privacyIDEA is a management and authentication system for two factor authentication. You can use OTP tokens, OTP cards, SMS, Smartphone Apps to incorparte the second factor. It can even manage SSH keys and supports Offline OTP. The latest version can manage and enroll user certificates. Its modular design makes it easily enhancable. It runs on Linux. Applications and workflows can be connected to privacyIDEA hence enabling two factor authentication in your system logon, web...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    X-Crack Full

    X-Crack Full

    The best SSH penetration testing tool ever!

    X-Crack Full is an SSH penetration testing tool. It is coded in Python.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    MySecureShell is a sftp-server developing tool which help to make a ftp server like proftpd but very securised with SSH encryption. This software is highly configurable and very easy to install and use. Project has moved to https://github.com/mysecureshell/mysecureshell !
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A framework for requesting packet traces via a SIMs context tool menu. Utilizing Perl as a wrapper for ssh and scp to access a PCAP datastore on a remote sensor. The remote sensor is a hardened server running a packetlogger(snort/tcpdump/dumpcap).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    gnome-ssh-properties is a SSH configuration tool for the GNOME desktop enviroment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB