cloud9ers / secure-sshd-saltLinks
Salt recipe to automatically secure sshd (and piss off the NSA)
☆16Updated 9 years ago
Alternatives and similar repositories for secure-sshd-salt
Users that are interested in secure-sshd-salt are comparing it to the libraries listed below
Sorting:
- MCVirt - Command line virtual machine management utility☆24Updated 4 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 8 years ago
- Secure multi-party cloud backup solution based on Shamir's Secret Sharing scheme.☆29Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- A Linux shell script to improve your privacy online☆85Updated 9 years ago
- Automation to manage a cygwin installation☆16Updated 7 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆148Updated 4 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Updated 7 years ago
- ☆56Updated 8 years ago
- HTTPS Server without a public/static IP. TLS Tunnels with decentralized credentials.☆87Updated 4 years ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansible☆41Updated 6 years ago
- nixarmor is a linux hardening automation project☆64Updated 3 years ago
- ☆97Updated 7 years ago
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago
- This server serves the files at airborn.io, manages users, and keeps track of users file sizes.☆61Updated 11 months ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- An Ansible role for using tor!☆72Updated 9 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Chair and the Key☆64Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Discover SPOF in DNS dependency graphs☆66Updated 7 years ago
- Yet Another Network Simulator☆25Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Boutique SSH keypair generator☆17Updated 9 years ago