Chroot & Sandbox Hardening: Implement system isolation techniques with chroot and sandbox environments to protect critical applications.
Log Cleanup: Ensure your system logs and activities are not tampered with by implementing logger dropper scripts that help you track and remove traces of suspicious actions.
User Hardening Scripts: Secure your system by implementing strict user management policies, including sudoer privileges and account lockdowns. These scripts make user hardening efficient and automated.
Secure System Notes & Configurations: Centralized security notes and configurations to keep your system security approach documented and organized.
Secure Web User Management: Manage web users and deploy secure web operations with these web-specific security tools and services.
USB Security & Defense: Prevent unauthorized USB devices from compromising your system with defense mechanisms and whitelisting scripts.
Web Security & Deployment: Secure your web servers, applications, and user access with automation scripts focused on hardening deployment and configuring secure environments.
Kali Wi-Fi Configuration: Replace NetworkManager with manual Wi-Fi config using wpa_supplicant and /etc/network/interfaces for minimal or headless Linux systems.