Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables deeper visibility than legacy tools.
-
Updated
Apr 10, 2024 - Python
Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables deeper visibility than legacy tools.
Cloudflare WAF (Web Application Firewall) rules + a script for their automatic updates. Block unwanted and malicious requests to enhance the security of your origin server!
Resources for Cyber Security
A linear guide to setting up a secure Debian Server.
A bot that uses various APIs to scan links directly inside any discord server automatically
An nftables configuration file with layer 7 filtering and DDoS protection for a Minecraft server. Includes rules for blocking fake sessions, query floods, and bot attacks, as well as filtering for IP addresses and port numbers.
This script automates the scanning process using the OpenSCAP Security Guid to hardening Ubuntu systems, aligning with DISA-STIG compliance for Ubuntu 20.04 LTS minimum. It includes a range of security enhancements and configurations designed to strengthen the security posture of Ubuntu servers.
Basic Implementation about Security of Server and Application Server
Web-Security(Web 安全)
This Discord bot is designed to provide file scanning functionality using the VirusTotal API to check for viruses and other malware in attachments uploaded to a Discord channel.
Security: Server authenticity and health verification
A Go-based tool for analyzing and automatically fixing security misconfigurations in common service configuration files (Apache, Nginx, SSH, etc.).
Web Server Config files
A completely randomized order of secrets; built with security in mind.
📖 Operating System Security Check Guide
A small plugin to manage server access by permissions
Script for auditing AIX plattforms in C, Ansi-style
my developer site on Github in german
Automate the hardening of your Linux server right after setup: secure SSH access, enable UFW with custom rules, block stealth scans and malicious IPs, and strengthen network settings via sysctl.
Add a description, image, and links to the server-security topic page so that developers can more easily learn about it.
To associate your repository with the server-security topic, visit your repo's landing page and select "manage topics."