beardlyness / NGINXY
Setup of NGINX, and turning it into a Reverse Proxy with hardened rules/settings.
☆11Updated 4 years ago
Related projects: ⓘ
- ☆29Updated this week
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 5 years ago
- ☆29Updated this week
- Lockdown is a set of scripts, lists and configuration files used to quickly implement granular intelligent automated firewall security at…☆17Updated 4 years ago
- Compare website blocking effectiveness of popular public DNS servers☆46Updated 4 years ago
- ☆23Updated this week
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 6 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆39Updated 4 years ago
- To block the malware domains of coin-hive systemwide.☆89Updated 4 years ago
- Bash Tutorials to accompany YouTube series☆8Updated 7 years ago
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆18Updated 7 years ago
- ☆76Updated this week
- Express security essentials deployment for Linux Servers☆58Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆11Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆59Updated 2 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆57Updated 6 years ago
- A Bash shell-script wrapping the IP address information API of http://ipinfo.io☆26Updated 6 years ago
- ☆90Updated this week
- General tools and scripts i want to make public to the world.☆44Updated 5 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆49Updated 12 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 6 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆79Updated 4 years ago
- Easily setup a hidden service inside the Tor network☆169Updated 10 months ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- ☆6Updated 7 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆43Updated 8 years ago
- A collection of anti-forensics scripts☆29Updated 4 years ago
- Tor traffic whitelisting gateway☆67Updated last week