aker-gateway / AkerView external linksLinks
SSH bastion/jump host/jumpserver
☆572Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for Aker
Users that are interested in Aker are comparing it to the libraries listed below
Sorting:
- An auditing / logging SSH relay for a jump box / bastion host.☆212Jul 11, 2019Updated 6 years ago
- ☆13Jan 17, 2019Updated 7 years ago
- A modern, web-based SSH console and key management tool. Bastillion gives you a clean, browser-based way to manage SSH access across all…☆3,445Feb 2, 2026Updated last week
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- simple, fun and transparent SSH (and telnet) bastion server☆1,915Updated this week
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆507Nov 19, 2024Updated last year
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A UNIX security auditing tool based on several security frameworks☆315Updated this week
- AWS Auditing & Hardening Tool☆713Feb 4, 2020Updated 6 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆261Oct 18, 2017Updated 8 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,988Jun 28, 2024Updated last year
- Tools for auditing WAFS☆464Nov 24, 2020Updated 5 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Mar 7, 2021Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Jan 2, 2022Updated 4 years ago
- Modular file scanning/analysis framework☆624Oct 8, 2019Updated 6 years ago
- Network Diagnostic Tool☆2,716Feb 26, 2020Updated 5 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- 🔒Secure Bastion implemented as Docker Container running Alpine Linux with Google Authenticator & DUO MFA support☆671Jan 30, 2026Updated 2 weeks ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- CURSE is an SSH certificate signing server, built as an alternative to Netflix's BLESS tool, but without a dependency on AWS.☆221Mar 2, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Easy automated vulnerability scanning, reporting and analysis☆709Jan 10, 2020Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- The easiest, and most secure way to access and protect all of your infrastructure.☆19,824Updated this week
- Automated WiFi limit evasion☆119Jan 26, 2017Updated 9 years ago
- uber's ssh certificate pam module☆866Mar 19, 2023Updated 2 years ago
- A collection of Ansible roles for automating infosec builds.☆92Dec 15, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,039Feb 7, 2026Updated last week
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆255Dec 12, 2022Updated 3 years ago