ssh
Projects with this topic
-
Python scripts starting/stopping and ssh connecting on all vmware vm's listed in a config file. Useful for autostarting all your vm's and autostarting terminals, that ssh connect to them (at boot).
Updated -
-
SSH config as Code! SSHaC manages any number of ssh configs with YAML. Automatically build host entries from a single line of yaml, after defining global options and cloud lookup providers. Currently, only AWS is supported.
Updated -
ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Updated -
-
Simple script to list all host entries in your SSH configuration. You can then choose to quickly connect to one of them.
Updated -
Linux host monitoring through standard SSH connections.
Updated -
irc bot to scan & bruteforce ssh/telnet
Updated -
Bash library to enhance your terminal, and manage repositories + data-syncs.
Updated -
A tool to find insecure Raspberry Pi using default SSH credentials worldwide.
Updated -
Just a holding space for my python portfolio.
Updated -
Run a CLI command sequence on multiple network devices over SSH in parallel. Tested on Riverbed SteelHead appliance and Cisco routers.
Updated -
This is a project called "PlatformBot" for Istanbul Zaim University AprilLand AGM Team's drone project.
Updated -
This project contains my personal shell commands that automate some parts of my day.
Updated -
openSeSSHIAMe allows SSH access to an instance behind the great AWS firewall (security group for the instance) for authorized IAM users.
Updated -
Library for communicating with network devices using ssh2-python.
Updated -
This is the repository of mimir, a network device web API developed by WOBCOM GmbH
Updated -
This is a mirror for the SSH library https://www.libssh.org/
Updated -
A SSH service to manage sessions and allow send messages betwen clients. It's using latest Python modules asyncio and asyncssh
Updated -
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Updated