Shows how easy it would be to gain unauthorized access to a system
Example PAM module demonstrating two-factor authentication
Fine-grained authorizations and single sign-on for SSH remote commands
Intelligently block brute-force attacks by aggregating system logs
SSH man-in-the-middle tool
Drop specified IP n seconds remotely, auto-undrop it when timeout.