ColumPaget / pam_honeycredsLinks
A pam module to send warnings when certain 'fake' passwords are used to login
☆15Updated 6 years ago
Alternatives and similar repositories for pam_honeycreds
Users that are interested in pam_honeycreds are comparing it to the libraries listed below
Sorting:
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- ☆30Updated 10 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 5 years ago
- YubiKey Key Storage Module☆53Updated 4 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Various tools for mattermost☆58Updated 9 years ago
- ☆56Updated 8 years ago
- ☆15Updated 8 years ago
- SSH configuration analysis☆74Updated 2 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- x11log - a tiny, non-privileged local+remote keylogger for X11☆17Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- ☆59Updated last year
- Framework to smartly mirror git repositories☆104Updated last year
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Updated 9 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 11 years ago
- Xelerance Official SSHFP repository☆25Updated 6 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- A small bash minifier/obfuscator written in Perl.☆54Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Detect and prevent crypto malware as it encrypts files☆69Updated 4 years ago
- Web of trust grapher☆38Updated 5 months ago
- LD_PRELOAD hack to redirect connections to other ports☆44Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- SSH connection daemon for Debian/Raspbian/Ubuntu/etc☆128Updated 2 years ago
- Packet-o-matic NG !☆64Updated 5 months ago
- An evil teddy bear that steals your secrets☆39Updated 7 years ago
- Command-line access to Up1☆42Updated 7 years ago