|5 days ago||about 1 month ago|
|MIT License||GNU General Public License v2.0 or later|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Was my raspberry hacked?
4 projects | reddit.com/r/linuxadmin | 29 Oct 2021
If you are worried about hacking attempts, installing fail2ban will help.
Help setting up fail2ban emails with UFW
1 project | reddit.com/r/selfhosted | 15 Oct 2021
[PSA] fail2ban: remote code execution via mail action
1 project | reddit.com/r/selfhosted | 28 Sep 2021
It should be noted that for better or (likely) worse, this CVE has been public since July 26th: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm
fail2ban - Remote Code Execution - CVE-2021-32749
1 project | reddit.com/r/netsec | 27 Sep 2021
This issue was part of the default fail2ban configs, and was fixed in their repos: https://github.com/fail2ban/fail2ban/commit/410a6ce5c80dd981c22752da034f2529b5eee844
Jellyfin + Nginx-Reverse-Proxy + fail2ban help
2 projects | reddit.com/r/jellyfin | 25 Sep 2021
Keep in mind that if your nginx is running in a docker you need to do the following also otherwise fail2ban will ban the ip address but iptables (see Issue 2376)
I find security vulnerabilities in the connected devices that we use every day. I’m the VP of Research at Armis — ask me anything!
2 projects | reddit.com/r/IAmA | 14 Sep 2021
Obviously your focus is on finding vulnerabilities, but how important would you say is stopping unauthorized people from even having a chance to find/exploit vulnerabilities in the first place? There are systems like like Fail2Ban and Login-Shield that use IP-based blacklisting that in my opinion can protect us from the vulnerabilities we aren't even aware of. How important is this in your plan of protection?
ZeroVer: 0-Based Versioning
10 projects | news.ycombinator.com | 12 Aug 2021
RCE vulnerability in fail2ban mailing action using mailutils (mail-whois)
1 project | reddit.com/r/netsec | 16 Jul 2021
5 Basic Things you need to know about managing a Linux server
2 projects | dev.to | 29 Jun 2021
If you have some memory and computation to spare, it might be a good idea to install software that prevents brute force attacks like Fail2Ban, or maybe just don't enable password-based login in SSH and disable database remote control when you don't need it.
Automate server intrusion detection and banning with Fail2ban
1 project | dev.to | 29 Jun 2021
Fail2ban jail configuration — Github.com/fail2ban
What are some alternatives?
crowdsec - CrowdSec - the open-source and participative IPS able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.
Suricata - Suricata git repository maintained by the OISF
OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Snort - Snort++
Denyhosts - Automated host blocking from SSH brute force attacks
pfSense - Main repository for pfSense
Wazuh - Wazuh - The Open Source Security Platform
SpamAssassin - Read-only mirror of Apache SpamAssassin. Submit patches to https://bz.apache.org/SpamAssassin/. Do not send pull requests
fwknop - Single Packet Authorization > Port Knocking
OSQuery - SQL powered operating system instrumentation, monitoring, and analytics.
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
MalConfScan - Volatility plugin for extracts configuration data of known malware