Reproducibly verify assumptions about your network: DNS, available hosts, open ports, TLS configuration; nmap, testssl, and dig/kdig in an Ansible-shaped trench coat.
Rysiek calls it a poor being's personal SHODAN.
A tool that can turn a flat nginx.conf file into an Ubuntu-style included multi-file configuration structure, the Ubuntu-type configs into a single flat nginx.conf file, or it can start over with a brand-new configuration.
Written as a shell script for portability.
A curated list of the most fabulous packages, prompts, and resources for the friendly interactive shell.
An Ansible playbook for setting up an Ansible XMPP server as a Tor hidden services. Notable because there's a main.yml file that describes how to configure the Tor hidden service itself. It lists all the ports that have to be available at the hidden service. It also has a sample Prosody config file that describes how to configure Prosody to serve up a hidden service and have it work.
Backup, restore, and sync the prefs and settings for your toolbox. Your dotfiles might be the most important files on your machine.
Learn from the community. Discover new tools for your toolbox and new tricks for the ones you already use.
Share what you’ve learned with the rest of us.
The goal of this document is to help operational teams with the configuration of TLS on servers. All Mozilla sites and deployment should follow the recommendations below. The Operations Security (OpSec) team maintains this document as a reference guide to navigate the TLS landscape. It contains information on TLS protocols, known issues and vulnerabilities, configuration examples and testing tools. Changes are reviewed and merged by the OpSec team, and broadcasted to the various Operational teams.
A perl script that can retrieve the config files of a variety of network devices for administrative or auditing purposes.
A Git repository of config files for various network services that hardens their settings and sets up SSL and/or TLS to encrypt traffic.
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
3421 links, including 116 private