Security Technical Implementation Guide for Debian
☆152Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for STIG-4-Debian
Users that are interested in STIG-4-Debian are comparing it to the libraries listed below
Sorting:
- It contains hardenedlinux community documentation.☆60Sep 19, 2023Updated 2 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Jul 7, 2019Updated 6 years ago
- Some scripts to create a reproducible build for grsecurity☆31Sep 19, 2017Updated 8 years ago
- ☆372Oct 30, 2025Updated 4 months ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 6 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆152Aug 10, 2018Updated 7 years ago
- ☆25Feb 2, 2026Updated last month
- GitHub action to download and install Xanitizer, and to run a Xanitizer security analysis in a GitHub workflow.☆10Jan 11, 2021Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Easiest way to make sure your page or post is ready to go live☆10Jan 19, 2026Updated last month
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Hardened PoC: PaX for Android☆39Jun 20, 2021Updated 4 years ago
- Docker based high interaction honeypot☆10May 7, 2018Updated 7 years ago
- ☆17Mar 8, 2024Updated last year
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- ☆14Nov 20, 2025Updated 3 months ago
- ☆13Jun 17, 2019Updated 6 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- building blocks for tor project websites☆16Oct 14, 2025Updated 4 months ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- 📖 A repo of configuration examples for StackHawk's Hawkscan!☆18Jan 28, 2026Updated last month
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- This chef cookbook provides secure ssh-client and ssh-server configurations.☆166Feb 26, 2026Updated last week
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- fabric8 based jenkins workflow steps☆11Nov 5, 2018Updated 7 years ago
- Python library and CLI for reading and writing cert_override.txt files.☆16Apr 18, 2019Updated 6 years ago
- DISA STIG/USGCB/NSA SNAC Hardening Scripts for Red Hat Enterprise Linux 6☆203Sep 12, 2019Updated 6 years ago
- ☆101Nov 10, 2021Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆192Jul 31, 2025Updated 7 months ago