RaymiiOrg / boa-diminish-restricted-shellLinks
A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with commands. Logs everything and escapes "dangerous" characters.
☆25Updated 11 years ago
Alternatives and similar repositories for boa-diminish-restricted-shell
Users that are interested in boa-diminish-restricted-shell are comparing it to the libraries listed below
Sorting:
- This bash script restricts ssh to a set of commands via .ssh/authorized_keys☆19Updated 12 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- Nitrokey's plugin for KeePass☆11Updated 6 years ago
- bookmark tool inspired by saved.io☆11Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆11Updated 4 years ago
- deadsimple BSD Security Advisories and Announcements☆17Updated this week
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Updated 9 years ago
- [mirror] Download and verify Linux distribution installers/ISO images☆19Updated 3 weeks ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 10 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- Checklists☆17Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- A Bash shell-script wrapping the IP address information API of http://ipinfo.io☆27Updated 7 years ago
- OpenELEC-AntiPrism - The living room secure PC for everyone☆14Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆34Updated 5 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated last year
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Tenshi - log monitoring tool☆48Updated 4 months ago