A simple project for creating hosting server-a-like live distribution
The idea is creating a simple and easy to install debian based secure system distibuted in LAMP stack as well and LNMP (nginx), with support for 32-64 bit cpus and small-large ram. Initial Stage: Creating stable live systems Second Stage: mod_mono and php coexistance, RoR, manage users/groups/packages scripts and system monitoring system, custom graphics Third Stage BUilding entire CnCP system (CnCp's not cPanel in old UNIX fashion), a web interface to create/manage and deploy users/accounts/monitoring on this server. You are more than welcome to help (developing/deploying/design/administration/words of wisdom/whatever you think you can do) Project current status is: Initial stage - > Alpha, virtualbox image of the system, when show some stable and secure properties will be released as livecd aswell (vmdk on its way)
Anadolu Panteri, Türkiye'de bireysel ve kurumsal olarak her kesime Linux desteği vermek, sevdirmek amaçlı kurulmuştur.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities. Any kernel-derived data can be audited.
A Monitoring Apparatus for General Kernel Event Tracing (MAGNET) is a high-fidelity low-overhead mechanism for exporting Linux kernel events to user space and a set of user-space tools for synthesizing high-level event from kernel-level events.
Brute-forcing WAN/LAN services
The author does not hold any responsability about the bad use of this script remmeber that attacking targets without prior concent its ilegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the full path to another dicionary File to be used In brute-forcing services. Adictionals tool settings can be configurated just by editing 'settings' file (nano settings) befor running the tool, settings like: use decoys (scanning WAN networks) OR spoof mac addr (change mac addr and ip addr), can only be config befor running the tool. (so the tool can use this settings to work).
A complete embedded operating system for proprietary SATA drive enclosures that simplifies the setup and management of logical volumes in a SATA RAID Array. The user interface is an intuitive web interface. Users can contribute to make it their own.
Raspberry Pi SD Image with Ruby and SiriProxy
This is an SD card image with RVM, Ruby, and SiriProxy pre-installed. Release notices: https://sourceforge.net/p/siriproxyrpi/news/ Instructions: https://sourceforge.net/p/siriproxyrpi/wiki/Home/
b0ss1X is a full featured Linux Distro created by Kasper5150 and Novalok from Backslash Security Group. It is used for network audits and network administration.
This program focuses on automating the download, installation and compilation of pentest tools from source