jtesta / ssh-auditLinks
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
☆4,046Updated 3 months ago
Alternatives and similar repositories for ssh-audit
Users that are interested in ssh-audit are comparing it to the libraries listed below
Sorting:
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,986Updated last year
- Passive hostname, domain and IP lookup tool for non-robots☆1,665Updated 3 weeks ago
- ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Ne…☆1,800Updated 2 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆11,898Updated last week
- A pretty sweet vulnerability scanner☆4,147Updated last year
- yubikey-agent is a seamless ssh-agent for YubiKeys.☆2,833Updated 2 years ago
- Best Practice Auditd Configuration☆1,730Updated 3 weeks ago
- Testing TLS/SSL encryption anywhere on any port☆8,783Updated this week
- SSH tarpit that slowly sends an endless banner☆8,373Updated last year
- SSH-MITM - ssh audits made simple☆1,422Updated 2 weeks ago
- Certificate Transparency Log Monitor☆1,114Updated 3 weeks ago
- Connect like there is no firewall. Securely.☆1,786Updated last month
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,203Updated last month
- PCI-DSS compliant Debian 11/12 hardening☆957Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,294Updated 4 months ago
- Hardening Ubuntu. Systemd edition.☆1,592Updated last week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆14,978Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,184Updated 2 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,077Updated last year
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆2,557Updated 3 weeks ago
- Swaks - Swiss Army Knife for SMTP☆1,209Updated last year
- Portspoof☆2,395Updated last week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,727Updated 4 years ago
- Canarytokens helps track activity and actions on your network.☆1,996Updated 2 weeks ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,604Updated last year
- A golang implementation of endlessh (SSH tarpit) exporting Prometheus metrics, visualized by a Grafana dashboard.☆1,206Updated last month
- A command-line DNS client.☆6,579Updated last year
- Vulnerability Intelligence Platform☆2,383Updated last week
- View HTTP/HTTPS requests made by any Linux program☆4,129Updated 3 weeks ago
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,896Updated last year