Vijay GuptaSystem Hardening Checklist for Systems/DevicesIn an age where cyber threats are evolving faster than ever, system hardening has become an indispensable aspect of cybersecurity. Whether…Nov 15
Ts. Gary KongBuilding Secure Projects: Leveraging the Security-by-Design FrameworkEngage a cybersecurity consultant from the beginning of the project and conduct a third-party penetration test before deployment.Nov 8
InAardvark InfinitybyAardvark InfinityChimeraDescription: A Python tool that automates the repurposing of operating systems for specific tasks such as secure communication hubs…Sep 30Sep 30
Purushotham Reddykubernetes system Hardening using Apparmorkubernetes system hardening using ApparmorJan 25, 2022Jan 25, 2022
InAardvark InfinitybyAardvark InfinityBash Script for Jesus’ Blue Team Tier 1 DefenseTitle: Jesus’ Blue Team Defense and Hardening ScriptSep 24Sep 24
Vijay GuptaSystem Hardening Checklist for Systems/DevicesIn an age where cyber threats are evolving faster than ever, system hardening has become an indispensable aspect of cybersecurity. Whether…Nov 15
Ts. Gary KongBuilding Secure Projects: Leveraging the Security-by-Design FrameworkEngage a cybersecurity consultant from the beginning of the project and conduct a third-party penetration test before deployment.Nov 8
InAardvark InfinitybyAardvark InfinityChimeraDescription: A Python tool that automates the repurposing of operating systems for specific tasks such as secure communication hubs…Sep 30
Purushotham Reddykubernetes system Hardening using Apparmorkubernetes system hardening using ApparmorJan 25, 2022
InAardvark InfinitybyAardvark InfinityBash Script for Jesus’ Blue Team Tier 1 DefenseTitle: Jesus’ Blue Team Defense and Hardening ScriptSep 24
InAardvark InfinitybyAardvark InfinityProgram Title: Automated System Hardening and Security Audit ScriptAuthor: System Admin Bash BuilderSep 16
InOCD OllybyAardvark InfinityFilename: superuser_command_enforcer.cDescription: This program acts as an enforcer for superuser commands, ensuring that only authorized commands are executed with superuser…Aug 23
InOCD OllybyAardvark InfinityFilename: absolute_system_call_interceptor.cDescription: This program intercepts and controls system calls made by processes, allowing you to monitor, modify, or block specific system…Aug 16