RaymiiOrg / boa-diminish-restricted-shell
A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with commands. Logs everything and escapes "dangerous" characters.
☆24Updated 11 years ago
Related projects: ⓘ
- ☆14Updated this week
- ☆29Updated this week
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- ☆11Updated this week
- Perl library for SHODAN☆17Updated 10 years ago
- Tips to protect your personal and company data☆26Updated 4 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆21Updated 6 years ago
- ☆10Updated this week
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 9 months ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- CISOfy Handbook☆28Updated 8 years ago
- ☆11Updated 3 years ago
- apbleed☆23Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Mattermost - Shodan Slash command☆30Updated 7 years ago
- Semantic SSH RSA keys☆25Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 8 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆26Updated 12 years ago
- This bash script restricts ssh to a set of commands via .ssh/authorized_keys☆18Updated 11 years ago
- Checklists☆14Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆16Updated 4 months ago
- A Bash shell-script wrapping the IP address information API of http://ipinfo.io☆26Updated 6 years ago
- Web of trust grapher☆38Updated 5 months ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆62Updated 2 years ago
- ☆23Updated this week
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 6 years ago