🧑💻 A comprehensive guide to Linux system administration, covering: 📜 Commands 👥 User Management 🌐 Networking 🔐 Permissions 📦 Package Management 💽 Disk Management 🛡️ Security 🤖 Automation ✅
-
Updated
Feb 4, 2026
🧑💻 A comprehensive guide to Linux system administration, covering: 📜 Commands 👥 User Management 🌐 Networking 🔐 Permissions 📦 Package Management 💽 Disk Management 🛡️ Security 🤖 Automation ✅
One-command Linux server security gateway: auth gateway + attack dashboard + vulnerability scanner + AI assistant. 一条命令部署的 Linux 服务器安全网关:认证网关 + 攻击看板 + 漏洞扫描 + AI 助手
Welcome to the SSH Penetration Testing Repository, a dedicated resource for cybersecurity professionals, penetration testers, and experts in the field. This repository is tailored to provide in-depth insights and tools for assessing the security of SSH (Secure Shell) implementations across critical infrastructure, telecommunications, and corporate
Post-quantum SSH infrastructure toolkit built on OQS-OpenSSH. Deploy hybrid and quantum-resistant authentication with multi-algorithm support and automated key management — without modifying your system OpenSSH.
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
Surveillance Script
Brute force attack detection using SSH logs and Fail2Ban with real-world simulation and mitigation.
Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 exploitation, stealth brute force capabilities, and fail2ban evasion techniques. Professional-grade security testing framework for authorized penetration testing engagements.
Python script to detect brute force SSH login attempts from raw logs
A one-click script to update and harden your Linux VPS or server. Supports: - Ubuntu - Debian - CentOS - AlmaLinux
Automated Linux SSH hardening framework enforcing PAM-based MFA and Zero-Trust network access controls. Features idempotent deployment, policy-as-code validation, and continuous compliance auditing via GitHub Actions.
Implementation of a secure enterprise network architecture using VLAN segmentation, Router-on-a-Stick, and Management Plane Protection (MPP) to enforce the Principle of Least Privilege.
Configured Fail2Ban to block malicious login attempts and secure Linux servers, with automated setup scripts.
Splunk SIEM lab — real-time SSH brute force detection, SPL queries, and dashboards mapped to MITRE ATT&CK T1110
The objective of this project is to design and implement a Splunk dashboard for monitoring SSH authentication activity on Linux servers.
20 hands-on Linux security engineering labs covering hardening, privilege control, firewalls, auditing, monitoring, and incident-ready administration.
Lightweight log scanner to flag brute-force attempts and high-volume hostile IP activity.
ansible-role to setup ssh-service as defined by mozilla :: https://infosec.mozilla.org/guidelines/openssh.html
Official portable healthchecks for Sznuper, built with Cosmopolitan C
An intelligent cybersecurity tool for detecting behavioral SSH anomalies on Linux servers via unsupervised ML and native systemd integration
Add a description, image, and links to the ssh-security topic page so that developers can more easily learn about it.
To associate your repository with the ssh-security topic, visit your repo's landing page and select "manage topics."