RaymiiOrg / restrict_ssh
This bash script restricts ssh to a set of commands via .ssh/authorized_keys
☆19Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for restrict_ssh
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆25Updated 11 years ago
- DNS Looking Glass☆76Updated 4 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Updated 3 years ago
- iptables rule generator☆30Updated 7 years ago
- Utility for unattended remote unlock of LUKS encrypted LVM using SSH and cryptsetup☆20Updated 6 years ago
- [discontinued] Unofficial HTML5/JS web admin interface for ZeroTier root nodes.☆12Updated 8 years ago
- Proxmox LXC Templates using DAB☆29Updated 9 years ago
- I can keep a SSHecret☆66Updated 10 months ago
- Monitor the reputation of your IP ranges☆83Updated 5 years ago
- Manage SSH and SSHFS connections via the command line using BASH!☆17Updated 6 years ago
- pdns-gui fork☆26Updated 8 years ago
- cfgtrack tracks and reports diffs in files between invocations.☆15Updated 7 years ago
- A working document on how to setup GNUPG and Yubikeys.☆13Updated 7 years ago
- Linux kernel module to snitch on data being where it shouldn't be (unmaintained)☆9Updated 7 years ago
- ☆16Updated 8 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆46Updated 11 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆36Updated 5 years ago
- ☆51Updated last year
- Borg Backup - unofficial Windows releases☆28Updated 7 years ago
- A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.☆24Updated 7 years ago
- Every tried to run 'diff' on 2 certificate files? Doesn't quite work. This tool helps resolve that: a clear report between 2 certificates…☆43Updated 8 years ago
- RouterOS (Mikrotik) Backup over SSH☆16Updated 10 years ago
- A backup system, similar to TimeMachine. Supports encrypted, incremental backups, with filesystem based recovery.☆59Updated this week
- Centralize or distribute IPset blacklists☆116Updated 5 months ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆12Updated 8 years ago
- Cross-Platform Linux Live Image Builder☆20Updated 3 years ago
- Template application for ZoneMTA☆40Updated 3 weeks ago
- Let's Encrypt encourages the use of certbot to automate certificate renewal, but that tool generates a new CSR every time. That makes DAN…☆12Updated last year
- Central syslog manager with whitelisting and ability to generate events from syslog entries☆82Updated 4 years ago