MockSSH is a testing tool that emulates operating systems behind SSH servers to enable task automation testing without requiring access to real servers. The tool supports end-to-end unit tests against SSH servers, allowing developers and security professionals to test SSH-based automation scripts and tools in a controlled environment. MockSSH includes a threaded version available from version 1.4, providing improved performance for concurrent testing scenarios. The tool is designed for ease of use and includes examples in both Python and LISP programming languages to help users implement testing scenarios. MockSSH serves as a simulation environment for SSH server interactions, making it useful for testing deployment scripts, configuration management tools, and other SSH-dependent automation without the need for actual server infrastructure.
FEATURES
SIMILAR TOOLS
SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.
IRIS-SOAR is a Python-based modular SOAR platform that automates security incident response workflows and integrates with DFIR-IRIS for enhanced digital forensics operations.
A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.
Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
Automated Digital Forensics and Incident Response (DFIR) software for rapid incident response and intrusion investigations.
RedEye is a visual analytic tool that provides enhanced situational awareness and operational insights for both Red and Blue Team cybersecurity operations.
An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.