A set of Ansible playbooks for building and running a tilde.
There are three roles currently being used: common, webservers, and shell. Pretty straightfoward, common applies to all machines in the inventory. webservers applies to the summit box. shell is for the phoenix box.
So, when you need to add a user, get a package installed, ]etc, please keep the above in mind, and do your changes in the correct role.
The Capsulecorp Pentest is a small virtual network managed by Vagrant and Ansible. It contains five virtual machines, including one Linux attacking system running Xubuntu and 4 Windows 2019 servers configured with various vulnerable services. This project can be used to learn network penetration testing as a stand-alone environment but is ultimatly designed to complement my book The Art of Network Penetration Testing.
Reproducibly verify assumptions about your network: DNS, available hosts, open ports, TLS configuration; nmap, testssl, and dig/kdig in an Ansible-shaped trench coat.
Rysiek calls it a poor being's personal SHODAN.
An Ansible playbook for setting up an Ansible XMPP server as a Tor hidden services. Notable because there's a main.yml file that describes how to configure the Tor hidden service itself. It lists all the ports that have to be available at the hidden service. It also has a sample Prosody config file that describes how to configure Prosody to serve up a hidden service and have it work.
A number of Github repos of code meant to be used to harden servers in various ways prior to deployment.
Ansible playbook for self-hosting your own email, web hosting, XMPP chat, and DNS records using OpenBSD. Used to host everything on c0ffee.net, but you can easily adapt it for your own domain by setting a few variables in vars.yml.
howto use ansible to configure and maintain a workstation.