trimstray / linux-hardening-checklist
Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.
☆1,536Updated 4 months ago
Alternatives and similar repositories for linux-hardening-checklist:
Users that are interested in linux-hardening-checklist are comparing it to the libraries listed below
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,084Updated 4 months ago
- Iptables Essentials: Common Firewall Rules and Commands.☆1,522Updated 4 months ago
- Hardening Ubuntu. Systemd edition.☆1,433Updated this week
- Automated System Hardening Framework☆982Updated last month
- A collection of awesome security hardening guides, tools and other resources☆5,722Updated 6 months ago
- A tool for checking the security hardening options of the Linux kernel☆1,833Updated 3 weeks ago
- Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.☆493Updated 5 years ago
- A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.☆10,959Updated 4 months ago
- Best Practice Auditd Configuration☆1,597Updated 2 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,644Updated 4 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆4,620Updated 9 months ago
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,784Updated 4 months ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,311Updated 3 years ago
- Various tips & tricks☆3,348Updated 2 weeks ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,444Updated 2 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,150Updated 3 months ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,098Updated last month
- awesome-linux-rootkits☆1,814Updated 3 months ago
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆4,822Updated 11 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,383Updated 2 years ago
- Mini-Internet using LXC for practical works☆341Updated 3 weeks ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆774Updated 5 months ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆787Updated 4 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,662Updated 3 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,209Updated 3 weeks ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,116Updated 9 months ago
- Tracking history of USB events on GNU/Linux☆1,165Updated 2 years ago
- Tools for Linux/Unix sysadmins.☆971Updated 5 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,718Updated 10 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆800Updated 3 months ago