awesome-security-hardening
privacy-respecting
awesome-security-hardening | privacy-respecting | |
---|---|---|
6 | 4 | |
4,965 | 1,931 | |
- | - | |
4.7 | 0.0 | |
about 1 month ago | 7 months ago | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-security-hardening
-
rate my threat model i will be implementing and i need help and tips also
If you want to go extreme, I remember from many years ago, there used to be a publicly released document by Australia's cyber security agency, made largely for Windows, which used to list attack vectors on a complex scale. I used to follow their listed possible vectors to formulate threat models as a kid for my Windows computer. Back in the day they used to provide PDF, now its webpages (https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening). This also exists (https://github.com/decalage2/awesome-security-hardening), a bit more wide coverage of OSes and practices.
-
Resources to learn backend security from scratch
Maybe these two repos can help you, I've used them both from time to time to look up stuff I have no idea about as a frontend main: https://github.com/imthenachoman/How-To-Secure-A-Linux-Server https://github.com/decalage2/awesome-security-hardening
- Android fans, what are the primary reasons why you will never ever switch to an Iphone?
- Resource for best practices/standard?
-
Brand new to Docker
here is a collection of hardening guides This will get you started in the right direction.
-
I Recently had a data breach and i think i secured everything. But did i? Help me please.
This is called system hardening. Try looking for CIS Benchmarks, awesome hardening (github), STIG's ,mitre baseline, hardening kitty, hardening checklist
privacy-respecting
-
Question to all the linux mint soldiers
Curated List of Privacy Respecting Services and Software
-
A quick rant- it's so hard to be private when you're basically technologically illiterate
You need to take a moment to realize it will be okay. You are going in the right direction, you just need to learn more https://youtube.com/watch?v=Y19RFmOxfVM https://git.nixnet.services/pluja/awesome-privacy https://github.com/nikitavoloboev/privacy-respecting https://github.com/humanetech-community/awesome-humane-tech#community
-
Open Source, a Gateway to Privacy/Security
There are many open source alternatives to operating systems, browsers, messengers, search engines, cloud storages, etc. Utilizing these more ethical softwares can be of assistance to improve privacy and security of your life. https://www.privacytools.io/ and https://github.com/nikitavoloboev/privacy-respecting are a great place to search.
-
The Pentagon is tracking US citizens without a warrant, Senator says
Here is a list of applications that should be avoided and plenty of alternatives.
What are some alternatives?
windows_hardening - HardeningKitty and Windows Hardening settings and configurations
alternative-frontends - ππ Privacy-respecting web frontends for popular services
microsoft-windows-10-stig-baseline - InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
personal-security-checklist - π A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
dockerholics - Apps and examples from the Dockerholics group.
iploggerfilter - This is a list for ublock Origin to filter any site who's only purpose is to log your IP
NIST-to-Tech - An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
privacytools.io - π‘π You are being watched. Protect your privacy against global mass surveillance.
awesome-golang-security - Awesome Golang Security resources πΆπ
Digital-Forensics-Guide - Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
awesome-cybersecurity-blueteam - :computer:π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
apparmor