Ssh
Explore 43 curated tools and resources
LATEST ADDITIONS
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
SSHGuard protects hosts from brute-force attacks by monitoring system logs, detecting attacks, and blocking attackers using a firewall.
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.
A Python-based honeypot service for SSH, FTP, and Telnet connections
A tool for SSH server auditing with comprehensive analysis capabilities.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
A CLI tool for securely generating keys, passwords, and providing credentials without files, primarily for building secure BOSH deployments using Vault and Spruce.
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
A tool for SSH server & client configuration auditing with comprehensive analysis and policy scans.
A webapp for displaying statistics about your kippo SSH honeypot.
A script for setting up a dionaea and kippo honeypot using Docker images.
Fake SSH server that sends push notifications for login attempts
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A network responder supporting various protocols with minimal assumptions on client intentions.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
Emulate operating systems behind SSH servers for testing automation.
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
RoboShadow
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.