Hardened Debian GNU/Linux distro auditing
☆460Mar 25, 2026Updated this week
Alternatives and similar repositories for harbian-audit
Users that are interested in harbian-audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PCI-DSS compliant Debian 11/12 hardening☆1,003Mar 2, 2026Updated 3 weeks ago
- Debian GNU/Linux based Services Profiles☆246Mar 27, 2022Updated 4 years ago
- Security Technical Implementation Guide for Debian☆152Apr 7, 2023Updated 2 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Jul 7, 2019Updated 6 years ago
- ☆372Oct 30, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Harbian distribution build documents.☆14Sep 1, 2020Updated 5 years ago
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- Simple utility to add a stream of DNS queries for random domains to obfuscate traffic patterns.☆11Oct 18, 2023Updated 2 years ago
- Harden and secure your Debian or Debian based OS, with this simple zero-configuration Debian bash script☆18May 30, 2022Updated 3 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Sep 7, 2024Updated last year
- Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark☆785Oct 2, 2023Updated 2 years ago
- ☆91Aug 5, 2023Updated 2 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆170Sep 7, 2024Updated last year
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,620Nov 19, 2024Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆26Sep 10, 2025Updated 6 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL☆5,281Mar 14, 2026Updated last week
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Mar 20, 2026Updated last week
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- It contains hardenedlinux community documentation.☆60Sep 19, 2023Updated 2 years ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- Desktop Firmware☆20Oct 9, 2018Updated 7 years ago
- A pre-DDoS security assessment tool☆119Jun 11, 2021Updated 4 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆27Aug 18, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,418Jan 28, 2026Updated last month
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Tool to perform misc Plex actions☆11Sep 21, 2019Updated 6 years ago