This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL
-
Updated
Jan 18, 2026 - Jinja
This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL
This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.
SSHD hardening for ed25519 key pairs
🥷🏻 Various bash stuff i find good to have 🔰
Advanced Privacy-Box: A RaspberryPi USB Ethernet Gadget that safeguards your Privacy while you work on your computer - Route all traffic through a WireGuard VPN or through a Tor Transparent Proxy, block ads and trackers via AdGuard Home, spoof your devices identity and cover your tracks.
Ansible role that hardens SSH server and client configurations based on ssh-audit recommendations. Supports Debian, Ubuntu, Rocky Linux 9, and Amazon Linux 2023. Provides safe defaults, repeatable audits, host key regeneration, brute-force mitigation and client hardening.
Hardening SSH on a 32‑bit Alpine Linux system.
A collection of Linux setup scripts and Docker Compose stacks for a Proxmox homelab, designed to be usable on most standard Linux systems. Includes VM setup, security hardening, AI development tools, and self-hosted services.
Easily automate the setup of a brand-new VPS with Docker, security hardening, and ready-to-deploy configurations.
Building a hardened Linux environment, security tools, and automation scripts from scratch.
✨ Simulation complète d'une infrastructure réseau SOHO sécurisée.
A project showcasing a Linux Hardening Scripts & Documentation
ansible-role to setup ssh-service as defined by mozilla :: https://infosec.mozilla.org/guidelines/openssh.html
Defense-in-depth Linux hardening with Snort IDS, Fail2Ban, SSH hardening, and file integrity monitoring achieving 100% attack detection
Modern hybrid Debian 13 server setup: Easy Bash scripts + powerful Ansible playbooks. Secure config for Samba, NFS, Apache, MariaDB, SSH & more using devsec, hardening. Quick bootstrap for home labs or production! 🚀
14 production-ready security components for Ubuntu hardening (CIS Benchmark 100%). Boot, AIDE, SSH, kernel, rkhunter, auditd (CIS 4.1.x), AppArmor, Vaultwarden, UFW, nftables, fail2ban, Lynis. Modular drop-in configs, Prometheus monitoring-ready. MIT License.
Secure and cost-efficient AWS VPC architecture using Terraform — featuring public/private subnets, NAT instance, SSH-hardened Bastion Host, custom route tables, and security groups. Built for production-grade cloud environments.
Secure AWS bastion host setup with Terraform automation, fail2ban, and SSH hardening for private infrastructure access
Add a description, image, and links to the ssh-hardening topic page so that developers can more easily learn about it.
To associate your repository with the ssh-hardening topic, visit your repo's landing page and select "manage topics."