RaymiiOrg / restrict_ssh
This bash script restricts ssh to a set of commands via .ssh/authorized_keys
☆19Updated 11 years ago
Alternatives and similar repositories for restrict_ssh:
Users that are interested in restrict_ssh are comparing it to the libraries listed below
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆25Updated 11 years ago
- Manage SSH and SSHFS connections via the command line using BASH!☆17Updated 7 years ago
- DNS Looking Glass☆76Updated 5 years ago
- This is a list of scripts I created while formerly working at Drexel University. These scripts were released with permission.☆16Updated 4 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆35Updated 5 years ago
- Nagios dashboard in ncurses☆18Updated 7 years ago
- A generic log anonymizer☆20Updated 3 years ago
- I can keep a SSHecret☆67Updated last year
- A working document on how to setup GNUPG and Yubikeys.☆13Updated 7 years ago
- ☆56Updated 7 years ago
- HTTP host monitoring and management through DNS☆10Updated 3 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Updated 3 years ago
- iptables rule generator☆30Updated 7 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- Certificate Authority management suite☆27Updated 7 years ago
- Centralize or distribute IPset blacklists☆116Updated 8 months ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 7 years ago
- Linux kernel module to snitch on data being where it shouldn't be (unmaintained)☆9Updated 7 years ago
- A backup system, similar to TimeMachine. Supports encrypted, incremental backups, with filesystem based recovery.☆59Updated this week
- Every tried to run 'diff' on 2 certificate files? Doesn't quite work. This tool helps resolve that: a clear report between 2 certificates…☆43Updated 8 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Updated 8 years ago
- Lafayette is a system to store various email abuse reports sent in ARF.☆75Updated 10 years ago
- Convert ARIN Whois bulk data to computer parsable routing data☆10Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Central syslog manager with whitelisting and ability to generate events from syslog entries☆84Updated 4 years ago
- A CLI tool to automate common Confluence maintenance tasks and content publishing.☆20Updated 4 years ago
- SSH configuration analysis☆75Updated 2 years ago
- Zerotier Chef CookbookUpdated last year
- Collect messages from a Postfix mail queue and preserve them as incident report☆7Updated 8 years ago