emirozer / nixarmor
nixarmor is a linux hardening automation project
☆64Updated 3 years ago
Alternatives and similar repositories for nixarmor:
Users that are interested in nixarmor are comparing it to the libraries listed below
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Updated 9 years ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 4 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 8 years ago
- A fast SSL/TLS reconnaisance tool written in Go☆59Updated 8 years ago
- SSH configuration analysis☆75Updated 2 years ago
- iptables rule generator☆30Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- ☆58Updated 8 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- ☆56Updated 7 years ago
- ☆14Updated 9 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- A docker based honeypot.☆149Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆25Updated 8 years ago
- framework for a high interaction SSH honeypot☆39Updated 5 years ago
- A backup system, similar to TimeMachine. Supports encrypted, incremental backups, with filesystem based recovery.☆59Updated last month
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- Dockerized ELK stack with some maintenance scripts for a bare metal host or virtual machine☆20Updated 8 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆63Updated 2 years ago
- netgrafio - Visualize your network☆327Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Lafayette is a system to store various email abuse reports sent in ARF.☆75Updated 11 years ago