The Capsulecorp Pentest is a small virtual network managed by Vagrant and Ansible. It contains five virtual machines, including one Linux attacking system running Xubuntu and 4 Windows 2019 servers configured with various vulnerable services. This project can be used to learn network penetration testing as a stand-alone environment but is ultimatly designed to complement my book The Art of Network Penetration Testing.
Reproducibly verify assumptions about your network: DNS, available hosts, open ports, TLS configuration; nmap, testssl, and dig/kdig in an Ansible-shaped trench coat.
Rysiek calls it a poor being's personal SHODAN.
An Ansible playbook for setting up an Ansible XMPP server as a Tor hidden services. Notable because there's a main.yml file that describes how to configure the Tor hidden service itself. It lists all the ports that have to be available at the hidden service. It also has a sample Prosody config file that describes how to configure Prosody to serve up a hidden service and have it work.
A number of Github repos of code meant to be used to harden servers in various ways prior to deployment.
A single command sets up a brand new Ubuntu 16.04 server running a wide variety of anti-censorship software that can completely mask and encrypt all of your Internet traffic. Uses Vagrant and Ansible to automate the process, from creation of OS image to deployment. Generates documentation as an HTML page to send to whomever you want to use the VPN server. Sets up a verified mirror of all the software the user might need, including VPN clients. Even implements techniques for evading some network blocking methods.
Ansible playbook for self-hosting your own email, web hosting, XMPP chat, and DNS records using OpenBSD. Used to host everything on c0ffee.net, but you can easily adapt it for your own domain by setting a few variables in vars.yml.
howto use ansible to configure and maintain a workstation.
3722 links, including 192 private