trimstray / linux-hardening-checklistLinks
Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.
☆1,597Updated last year
Alternatives and similar repositories for linux-hardening-checklist
Users that are interested in linux-hardening-checklist are comparing it to the libraries listed below
Sorting:
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,412Updated last year
- Iptables Essentials: Common Firewall Rules and Commands.☆1,559Updated last year
- Hardening Ubuntu. Systemd edition.☆1,512Updated this week
- Automated System Hardening Framework☆1,036Updated 9 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,017Updated last year
- Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.☆524Updated 6 years ago
- A tool for checking the security hardening options of the Linux kernel☆2,001Updated last week
- Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark☆782Updated 2 years ago
- Hardened Debian GNU/Linux distro auditing☆458Updated last year
- My curated list of awesome links, resources and tools on infosec related topics☆1,138Updated 4 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,027Updated 5 months ago
- Tools for Linux/Unix sysadmins.☆991Updated 5 years ago
- Open source tool to help you build a valid SSL certificate chain.☆374Updated last year
- Penetrum LLC opensource security tool list.☆654Updated 3 years ago
- 🔥 A curated list of awesome links related to application security related to the environments with NGINX or Kubernetes Ingres Controller…☆772Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,177Updated 3 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,723Updated 4 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,248Updated 11 months ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,357Updated 3 years ago
- Basic guide to harden systemd services☆258Updated 5 years ago
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,832Updated last year
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,982Updated 3 months ago
- Lockdown your linux install. The simple zero config linux hardening script☆369Updated 5 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,805Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,425Updated last year
- Best Practice Auditd Configuration☆1,718Updated last week
- A reading and viewing list for larval stage SREs and sysadmins☆594Updated last week
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆504Updated last year
- A curated list of awesome Security Hardening techniques for Windows.☆1,794Updated 5 years ago
- A pretty sweet vulnerability scanner☆4,147Updated last year