cloud9ers / secure-sshd-salt
Salt recipe to automatically secure sshd (and piss off the NSA)
☆16Updated 8 years ago
Alternatives and similar repositories for secure-sshd-salt:
Users that are interested in secure-sshd-salt are comparing it to the libraries listed below
- Automation to manage a cygwin installation☆16Updated 7 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 8 years ago
- ☆30Updated 9 years ago
- ☆56Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- A Linux shell script to improve your privacy online☆83Updated 9 years ago
- Discover SPOF in DNS dependency graphs☆67Updated 6 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- MCVirt - Command line virtual machine management utility☆24Updated 4 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 8 years ago
- A more isolated virtualenv☆28Updated 6 years ago
- A lightweight, self-hosted and API-based file upload server supporting YubiKey OTP authentication.☆23Updated 4 years ago
- Yet Another Network Simulator☆25Updated 8 years ago
- Secure multi-party cloud backup solution based on Shamir's Secret Sharing scheme.☆29Updated 8 years ago
- nixarmor is a linux hardening automation project☆64Updated 2 years ago
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 7 years ago
- Tools to do fun things with ubiquity gear☆18Updated 2 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- udev hook and accompanying script to lock/unlock a workstation when a yubikey is plugged/unplugged☆19Updated 7 years ago
- An Ansible role for using tor!☆73Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Syncany Flickr Plugin (fun plugin)☆12Updated 9 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 4 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 11 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Updated 3 years ago
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆25Updated 8 years ago
- DNS Firewall Enforcer☆49Updated 5 years ago