duraconf - A collection of hardened configuration files for SSL/TLS services
☆55Jan 18, 2015Updated 11 years ago
Alternatives and similar repositories for duraconf
Users that are interested in duraconf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH configuration analysis☆74Feb 3, 2023Updated 3 years ago
- ☆307Apr 19, 2023Updated 3 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆977May 16, 2022Updated 3 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Protect BSD Unix computer servers from brute-force attacks. It works on top of the OpenBSD Packet Filter(PF) firewall.☆12Jun 21, 2025Updated 10 months ago
- Simple, Flexible, and Powerful IRC bot written in Python3☆10Nov 12, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- terminal wrapper library for ncurses with smooth 256 color handling, termbox, or a virtual terminal on SDL☆18Oct 16, 2022Updated 3 years ago
- repo for sharing stuff☆17Jul 1, 2025Updated 10 months ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Jun 1, 2015Updated 10 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 5 years ago
- ☆16Apr 10, 2015Updated 11 years ago
- Quick navigation between workspaces in emacs☆16Jul 27, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- A tool for managing complex enterprise Kubernetes environments as code.☆47Updated this week
- ☆17Nov 12, 2017Updated 8 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.