awesome-security-hardening
termux-packages
awesome-security-hardening | termux-packages | |
---|---|---|
6 | 328 | |
4,965 | 12,236 | |
- | 1.7% | |
4.7 | 10.0 | |
about 1 month ago | 2 days ago | |
Shell | ||
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-security-hardening
-
rate my threat model i will be implementing and i need help and tips also
If you want to go extreme, I remember from many years ago, there used to be a publicly released document by Australia's cyber security agency, made largely for Windows, which used to list attack vectors on a complex scale. I used to follow their listed possible vectors to formulate threat models as a kid for my Windows computer. Back in the day they used to provide PDF, now its webpages (https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening). This also exists (https://github.com/decalage2/awesome-security-hardening), a bit more wide coverage of OSes and practices.
-
Resources to learn backend security from scratch
Maybe these two repos can help you, I've used them both from time to time to look up stuff I have no idea about as a frontend main: https://github.com/imthenachoman/How-To-Secure-A-Linux-Server https://github.com/decalage2/awesome-security-hardening
- Android fans, what are the primary reasons why you will never ever switch to an Iphone?
- Resource for best practices/standard?
-
Brand new to Docker
here is a collection of hardening guides This will get you started in the right direction.
-
I Recently had a data breach and i think i secured everything. But did i? Help me please.
This is called system hardening. Try looking for CIS Benchmarks, awesome hardening (github), STIG's ,mitre baseline, hardening kitty, hardening checklist
termux-packages
-
Usbredir: A protocol for sending USB device traffic over a network connection
usbredirect, USB drives/disks, Termux, termux-usb, QEMU, and Alpine Linux in action in April 2024 on an Android 11 phone that is not rooted --> Update-6, Update-7, Update-8, Update-9, Update-10 at https://github.com/termux/termux-packages/issues/19635
"USB Network Redirection protocol description version 0.7 (19 May 2014)": https://gitlab.freedesktop.org/spice/usbredir/-/blob/main/do... (gitlab.freedesktop.org/spice/usbredir/-/blob/main/docs/usb-redirection-protocol.md)
"How to use Spice "Open remote computing"" Hans de Goede "@ T-DOSE 2011, Eindhoven": https://www.youtube.com/watch?v=e1fC3GOTHOY (www.youtube.com/watch?v=e1fC3GOTHOY)
-
"Is it Worth Rooting your Phone in 2023?"
Phone (not rooted) running Android 11 and Termux doing superuser/root operations on a USB flash drive connected to the phone, for example "cryptsetup luksFormat /dev/sda1" and "mkfs.ext4 /dev/mapper/v1" --> Update-6 through Update-8 and "Connecting a USB device to QEMU using termux, termux-usb, usbredirect" at https://github.com/termux/termux-packages/issues/19635 (see also Update-9, Update-10, Update-11).
-
Security of an encrypted partition in a flash drive
Done on a phone that is not rooted running Termux, termux-usb, usbredirect, and QEMU --> "cryptsetup luksFormat /dev/sda1" and "cryptsetup luksOpen /dev/sda1 v1" and "mkfs.ext4 /dev/mapper/v1" and "mount /dev/mapper/v1 /root/1" where "/dev/sda1" is a partition on a USB flash drive ("dev/sda") plugged in the phone: https://github.com/termux/termux-packages/issues/19635 (github.com/termux/termux-packages/issues/19635'cryptsetup)
- "Connecting a USB device to QEMU using termux, termux-USB, usbredirect"
-
PinePhone review after a month of daily driving
Yes. Even without enabling root, you can install Termux[1] and have a full Linux cli environment with ssh.
> don't understand not more people want to access their DCIM folder via sshfs
I agree. I sync my camera folder with Syncthing[1], so as soon as I take a photo it is available on my laptop.
1: https://termux.dev/
-
Termux: Linux Applications on Android
As usual don't forget that Android/Linux isn't GNU/Linux,
https://github.com/termux/termux-packages/wiki/Termux-and-An...
https://developer.android.com/ndk/guides/stable_apis
https://android.googlesource.com/platform/bionic/+/master/an...
- GNU Guix into Termux
-
A standalone zero-dependency Lisp for Linux
With this, I was able to cross compile lone for x86_64 from within the Termux environment of my aarch64 smartphone. All I had to do was obtain the Linux user space API headers for x86_64.
I made a Termux package request for multiplatform Linux UAPI headers specifically so I could cross compile lone but unfortunately it was rejected.
https://github.com/termux/termux-packages/issues/16069
-
Why SQLite Does Not Use Git
I wonder how far you could get with the git client in termux. I got vim running at one point.
[1] https://termux.dev/
[2] https://packages.termux.dev/apt/termux-main/pool/main/g/git/
-
Crystal is now available on Termux AArch64
Crystal can be installed with just pkg install crystal. If you have Docker, you could also clone the build environment and try building Crystal locally with scripts/run-docker.sh scripts/build-package.sh -I -a aarch64 crystal.
What are some alternatives?
windows_hardening - HardeningKitty and Windows Hardening settings and configurations
nix-on-droid - Nix-enabled environment for your Android device.
microsoft-windows-10-stig-baseline - InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
UserLAnd - Main UserLAnd Repository
dockerholics - Apps and examples from the Dockerholics group.
Code-Server - VS Code in the browser
NIST-to-Tech - An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
xmrig - Monero (rx/0, rx/wow, rx/loki, defyx, rx/arq, rx/sfx, rx/keva, cn/0, cn/1, cn/2, cn/r, cn/fast, cn/half, cn/xao, cn/rto, cn/rwz, cn/zls, cn/double, cn/gpu, cn-lite/0, cn-lite/1, cn-heavy/0, cn-heavy/tube, cn-heavy/xhv, cn-pico, cn-pico/tlo, argon2/chukwa, argon2/wrkz, astrobwt) CPU/GPU miner
awesome-golang-security - Awesome Golang Security resources πΆπ
chromium - The official GitHub mirror of the Chromium source
awesome-cybersecurity-blueteam - :computer:π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
android-tools - Android tools built for Android devices.