An evolving how-to guide for securing a Linux server.
☆15Apr 12, 2019Updated 6 years ago
Alternatives and similar repositories for How-To-Secure-A-Linux-Server
Users that are interested in How-To-Secure-A-Linux-Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 5 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆24Jul 19, 2019Updated 6 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Nov 3, 2019Updated 6 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆14Oct 28, 2018Updated 7 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- A collection of resources, guides and automation scripts used to secure the Docker platform☆33May 5, 2024Updated last year
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Mar 29, 2020Updated 5 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- A Simple C Reverse Shell☆22Jan 9, 2019Updated 7 years ago
- List of Awesome Red Teaming Resources☆116Jan 2, 2019Updated 7 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A collection of python scripts that are used for network analysis and testing.☆59Oct 4, 2019Updated 6 years ago
- Freely available programming books☆69Oct 3, 2018Updated 7 years ago
- A collection of shell scripts from the scripting series.☆47Mar 1, 2022Updated 4 years ago
- A list of web application security☆79Oct 8, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆26Jan 18, 2021Updated 5 years ago
- Go bindings for Carina™☆13Feb 6, 2017Updated 9 years ago
- ☆15Dec 16, 2017Updated 8 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Algorithms of facial recognition through sketches☆13May 9, 2014Updated 11 years ago
- ☆12Dec 30, 2020Updated 5 years ago
- SecOps-Daily_Class☆12Oct 21, 2024Updated last year
- Some tips and tricks for your .htaccess file (Apache)☆15Nov 1, 2021Updated 4 years ago
- ☆12May 4, 2021Updated 4 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Simple Responsive HTML Email Template☆12Aug 15, 2016Updated 9 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- A collection of personal dotfiles and configurations. Feel free to snoop around and use what interests you.☆13May 30, 2021Updated 4 years ago
- Keep a few examples of Jenkins Pipelines☆16Jul 23, 2017Updated 8 years ago
- ☆17Jul 5, 2023Updated 2 years ago