Shows how easy it would be to gain unauthorized access to a system
Example PAM module demonstrating two-factor authentication
Fine-grained authorizations and single sign-on for SSH remote commands
API for Password Manager Daemon (pwmd)
Intelligently block brute-force attacks by aggregating system logs
SSH man-in-the-middle tool
ssh-tunnel instead vpn in one exe
A file system plugin Total Commander
Drop specified IP n seconds remotely, auto-undrop it when timeout.