The full text of the second edition of Firewalls and Internet Security: Repelling the Wily Hacker is now available under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Log configurations and scripts for host intrusion detection system. iptables, syslog and psad configs are here because they are becoming hard to otherwise manage. Configs for various systemd units, rsyslog, psad, logrotate, iptables. Tabkey completion files for bash. Manpages. A couple of scripts for managing running settings.
A perl script that can retrieve the config files of a variety of network devices for administrative or auditing purposes.
This web app generates text files of netblocks in CIDR format, suitable for dropping into firewalls to deny traffic from just about any country on the planet.
iblocklist.com makes available many lists of IP addresses in several formats that can be dropped into firewalls or applications to prevent connections attempts from those hosts. Among the lists are known spammers, spyware servers, open proxies, advertising services, governments, and anonymizing services. Useful for perimeter security.