🧑💻 A comprehensive guide to Linux system administration, covering: 📜 Commands 👥 User Management 🌐 Networking 🔐 Permissions 📦 Package Management 💽 Disk Management 🛡️ Security 🤖 Automation ✅
-
Updated
Feb 4, 2026
🧑💻 A comprehensive guide to Linux system administration, covering: 📜 Commands 👥 User Management 🌐 Networking 🔐 Permissions 📦 Package Management 💽 Disk Management 🛡️ Security 🤖 Automation ✅
One-command Linux server security gateway: auth gateway + attack dashboard + vulnerability scanner + AI assistant. 一条命令部署的 Linux 服务器安全网关:认证网关 + 攻击看板 + 漏洞扫描 + AI 助手
Welcome to the SSH Penetration Testing Repository, a dedicated resource for cybersecurity professionals, penetration testers, and experts in the field. This repository is tailored to provide in-depth insights and tools for assessing the security of SSH (Secure Shell) implementations across critical infrastructure, telecommunications, and corporate
Post-quantum SSH infrastructure toolkit built on OQS-OpenSSH. Deploy hybrid and quantum-resistant authentication with multi-algorithm support and automated key management — without modifying your system OpenSSH.
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
"Implementasi Intrusion Detection System (IDS) menggunakan Snort dengan integrasi notifikasi real-time via Telegram Bot untuk memonitor aktivitas jaringan."
Surveillance Script
Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 exploitation, stealth brute force capabilities, and fail2ban evasion techniques. Professional-grade security testing framework for authorized penetration testing engagements.
Brute force attack detection using SSH logs and Fail2Ban with real-world simulation and mitigation.
Lab keamanan dasar: Simulasi serangan brute-force SSH menggunakan Hydra dan implementasi pertahanan otomatis menggunakan Fail2Ban & nftables.
Python script to detect brute force SSH login attempts from raw logs
A one-click script to update and harden your Linux VPS or server. Supports: - Ubuntu - Debian - CentOS - AlmaLinux
🚀 Debian 12 SSH 安全加固指南。包含 Ed25519 公钥配置、禁用密码登录及 FinalShell 图形化连接教程。防范暴力破解,打造企业级 VPS 登录安全环境。
Implementation of a secure enterprise network architecture using VLAN segmentation, Router-on-a-Stick, and Management Plane Protection (MPP) to enforce the Principle of Least Privilege.
Configured Fail2Ban to block malicious login attempts and secure Linux servers, with automated setup scripts.
The objective of this project is to design and implement a Splunk dashboard for monitoring SSH authentication activity on Linux servers.
Splunk SIEM lab — real-time SSH brute force detection, SPL queries, and dashboards mapped to MITRE ATT&CK T1110
Automated Linux SSH hardening framework enforcing PAM-based MFA and Zero-Trust network access controls. Features idempotent deployment, policy-as-code validation, and continuous compliance auditing via GitHub Actions.
Advanced OpenClaw security monitoring with trends, cost analysis, and automated fixes. $9/mo.
ansible-role to setup ssh-service as defined by mozilla :: https://infosec.mozilla.org/guidelines/openssh.html
Add a description, image, and links to the ssh-security topic page so that developers can more easily learn about it.
To associate your repository with the ssh-security topic, visit your repo's landing page and select "manage topics."