How-To-Secure-A-Linux-Server
Server security guide
An evolving how-to guide for securing a Linux server
An evolving how-to guide for securing a Linux server.
18k stars
329 watching
1k forks
last commit: about 2 months ago
Linked from 3 awesome lists
cc-by-sahardeninghardening-stepslinuxlinux-serversecuritysecurity-hardeningserver
Related projects:
Repository | Description | Stars |
---|---|---|
trimstray/the-practical-linux-hardening-guide | A comprehensive guide to creating secure Linux production systems using industry standards and best practices | 9,956 |
veeral-patel/how-to-secure-anything | A comprehensive guide to securing systems and applications by applying engineering principles to security | 9,955 |
jtesta/ssh-audit | A tool for auditing SSH server and client configurations to identify security vulnerabilities and potential weaknesses. | 3,469 |
freach/kubernetes-security-best-practice | A comprehensive guide to securing Kubernetes clusters in the cloud or on-premises | 2,695 |
fallibleinc/security-guide-for-developers | A comprehensive security guide for developers to help create more secure systems | 20,950 |
linuxserver/docker-swag | An all-in-one web application gateway with Nginx, PHP, and security features | 2,941 |
deepfence/secretscanner | A tool that scans container images and file systems for sensitive data such as passwords and keys. | 3,146 |
liamg/traitor | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |
arthepsy/ssh-audit | An auditing tool for evaluating the security and configuration of SSH servers | 2,959 |
pratiktri/server_init_harden | Automates server security hardening on initial login as root | 94 |
drduh/macos-security-and-privacy-guide | A comprehensive guide to securing and improving privacy on Apple silicon Mac computers running macOS. | 21,367 |
samyk/poisontap | Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,267 |
appleboy/ssh-action | A GitHub Actions workflow for executing remote SSH commands using various protocols and options. | 4,890 |
hwdsl2/setup-ipsec-vpn | Automates setup of an IPsec VPN server with IKEv2 and L2TP support | 25,489 |
opennhp/opennhp | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |