A set of blue team scripts for hardening Linux systems focusing on competitions and locking a system down.
-
Updated
May 16, 2024 - Shell
A set of blue team scripts for hardening Linux systems focusing on competitions and locking a system down.
Full set of AppArmor profiles (~ 1500 profiles)
Security automation content in SCAP, Bash, Ansible, and other formats
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
Ansible role to apply a security baseline. Systemd edition.
HardenedBSD implements strong exploit mitigations and security hardening technologies on top of FreeBSD, with a direct focus on the nexus between human rights and information security. HardenedBSD is the first (and only) enterprise operating system to have every part of its public infrastructure accessible by human-rights focused technologies li…
Dynamic loading with privilege separation
🛡️ Make your web services secure by default !
Automation Troubleshooting Framework to validate and report configuration, software installed, etc with bash, python, and your language of choice.
Network egress filtering and runtime security for GitHub-hosted and self-hosted runners
Packer templates to create hardened Ubuntu server images.
Hardening Ubuntu. Systemd edition.
Ansible role to install a rootless Docker server
Modern semi-automatic Windows OS hardening software
Ansible role to install fail2ban
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Add a description, image, and links to the hardening topic page so that developers can more easily learn about it.
To associate your repository with the hardening topic, visit your repo's landing page and select "manage topics."