centos8-post-install
CentOS 8 Streams post install steps (by damiantroy)
ssh-audit
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) (by jtesta)
Our great sponsors
centos8-post-install | ssh-audit | |
---|---|---|
1 | 21 | |
0 | 3,133 | |
- | - | |
10.0 | 8.6 | |
almost 4 years ago | 6 days ago | |
Python | ||
GNU General Public License v3.0 only | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
centos8-post-install
Posts with mentions or reviews of centos8-post-install.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-10-05.
-
How many of you use SSH to manage your server?
I wrote myself a small guide loosely based on the NIST security checklist for new servers running RHEL/CentOS/Rocky 8, but the SSH components parts may still be usable in other OSes.
ssh-audit
Posts with mentions or reviews of ssh-audit.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-12-19.
-
Terrapin Attack for prefix injection in SSH
No. Mitigations are available now. Follow the recommendations from ssh-audit (master version). [0]
0. https://github.com/jtesta/ssh-audit
- SSH-audit: SSH server and client security auditing
- Quick/simple question checking for SSH vulnerabilities
- Why so many bots?
-
How to secure my self-hosted website?
Match Address 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 PasswordAuthentication yes ```` You may audit your SSH service by https://github.com/jtesta/ssh-audit
-
Why does my SSH private key still work after changing some bytes? (2016)
Off topic: audit tool for OpenSSH config files.
Posted here because SSH algorithms are a moving target.
https://github.com/jtesta/ssh-audit/tree/e50ac5c84d46e902e02...
-
SFTP (SSH) Cipher Sanity Check
In addition to ssllabs, I'll recommend jtesta's ssh-audit.py
What are some alternatives?
When comparing centos8-post-install and ssh-audit you can also consider the following projects:
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
Pritunl - Enterprise VPN server
mistborn
testssl.sh - Testing TLS/SSL encryption anywhere on any port
endlessh - SSH tarpit that slowly sends an endless banner
yubikey-agent - yubikey-agent is a seamless ssh-agent for YubiKeys.
ufw-docker - To fix the Docker and UFW security flaw without disabling iptables
tinyssh - TinySSH is small server (less than 100000 words of code)
easy-admin - Scripts for easy system administration
centos8-post-install vs Nebula
ssh-audit vs Pritunl
centos8-post-install vs mistborn
ssh-audit vs testssl.sh
centos8-post-install vs endlessh
ssh-audit vs yubikey-agent
centos8-post-install vs Pritunl
ssh-audit vs ufw-docker
ssh-audit vs tinyssh
ssh-audit vs mistborn
ssh-audit vs easy-admin
ssh-audit vs Nebula