11 programs for "ssh tunnel manager" with 1 filter applied:

  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • 1
    Doffen SSH Tunnel

    Doffen SSH Tunnel

    Manage hierarchy of ssh sessions and tunnels

    Ssh terminal, file transfer and tunneling tool. The focus is on running tunnels inside tunnels. That one has to jump through several machines. Please see the wiki pages for documentation. https://sourceforge.net/p/doffensshtunnel/wiki/Home/
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 2
    ConnectBot

    ConnectBot

    ConnectBot is the first SSH client for Android

    ConnectBot is a secure shell client for the Android platform. Its ultimate goal is to create a secure connection through which you can use a shell on a remote machine and transfer files back and forth to your phone. ConnectBot is a powerful open source SSH (Secure Shell) client. It can handle several simultaneous sessions, create secure connections in tunnel mode and allows Copy/Paste from other applications. This client allows you to connect to SSH (Secure Shell) servers that typically include...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Laravel Envoy

    Laravel Envoy

    Elegant SSH tasks for PHP

    Laravel Envoy is a tool for executing common tasks you run on your remote servers. Using Blade-style syntax, you can easily set up tasks for deployment, Artisan commands, and more. Currently, Envoy only supports the Mac and Linux operating systems. However, Windows support is achievable using WSL2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Double Commander
    Double Commander is a cross platform open source file manager with two panels side by side. It is inspired by Total Commander and features some new ideas.
    Leader badge
    Downloads: 10,674 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 5
    Unattended Resolution in A Nutshell - OS
    Unattended installation of several Linux(kickstart,preseed,autoyast) and Windows(2000,XP,2003,2003R2,Vista,7,8,2008,2012). Features: inventory, software management, dhcp-ldap, dns-ldap, php-ssh, syslog-ng, rsyslog, switch managment, ldap browser, pxe manager, central cron management, license management.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    ... was only accessible from the compromised machine. If the compromised host is behind a Firewall / NAT and isn't directly accessible from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on the compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessible from the compromised machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    SSH Access Manager

    SSH Key Management solution

    SSH Access Manager is a comprehensive access security management platform that permits IT professionals to easily establish and maintain an enterprise-wide SSH access security solution from a central location. It enables a team of system administrators to centrally manage and deploy ssh keys. This app is intended to be used in rather large environnements where access to unix accounts are handled with ssh keys. SSH Access Manager allows you to maintain user public keys. You can organise...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A Python IRC Console Client. I use it to tunnel irc through ssh when I'm at the university. It isn't finished yet, but works quite well for me. The base work is done, but I will revise most of the code soon, so it will be more structured hopefully.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 10
    Allows support personnel to remotely control a computer running Mac OS X over an SSH tunnel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Creates an ssh tunnel on demand
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next