Hardened Debian GNU/Linux distro auditing
☆460Jul 7, 2024Updated last year
Alternatives and similar repositories for harbian-audit
Users that are interested in harbian-audit are comparing it to the libraries listed below
Sorting:
- PCI-DSS compliant Debian 11/12 hardening☆997Updated this week
- Debian GNU/Linux based Services Profiles☆245Mar 27, 2022Updated 3 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Jul 7, 2019Updated 6 years ago
- Security Technical Implementation Guide for Debian☆152Apr 7, 2023Updated 2 years ago
- ☆372Oct 30, 2025Updated 4 months ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆182Updated this week
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Nov 15, 2022Updated 3 years ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark☆788Oct 2, 2023Updated 2 years ago
- It contains hardenedlinux community documentation.☆60Sep 19, 2023Updated 2 years ago
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Feb 26, 2020Updated 6 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- A pre-DDoS security assessment tool☆118Jun 11, 2021Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,615Nov 19, 2024Updated last year
- ☆332Dec 8, 2022Updated 3 years ago
- This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL☆5,232Feb 25, 2026Updated last week
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Simple utility to add a stream of DNS queries for random domains to obfuscate traffic patterns.☆11Oct 18, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Sep 7, 2024Updated last year
- A UNIX security auditing tool based on several security frameworks☆315Updated this week
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year