π§βπ» A comprehensive guide to Linux system administration, covering: π Commands π₯ User Management π Networking π Permissions π¦ Package Management π½ Disk Management π‘οΈ Security π€ Automation β
-
Updated
Dec 23, 2025
π§βπ» A comprehensive guide to Linux system administration, covering: π Commands π₯ User Management π Networking π Permissions π¦ Package Management π½ Disk Management π‘οΈ Security π€ Automation β
Welcome to the SSH Penetration Testing Repository, a dedicated resource for cybersecurity professionals, penetration testers, and experts in the field. This repository is tailored to provide in-depth insights and tools for assessing the security of SSH (Secure Shell) implementations across critical infrastructure, telecommunications, and corporate
Surveillance Script
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 exploitation, stealth brute force capabilities, and fail2ban evasion techniques. Professional-grade security testing framework for authorized penetration testing engagements.
ansible-role to setup ssh-service as defined by mozilla :: https://infosec.mozilla.org/guidelines/openssh.html
Configured Fail2Ban to block malicious login attempts and secure Linux servers, with automated setup scripts.
A Telegram bot for monitoring SSH logins and managing fail2ban
The objective of this project is to design and implement a Splunk dashboard for monitoring SSH authentication activity on Linux servers.
Automated Linux SSH hardening framework enforcing PAM-based MFA and Zero-Trust network access controls. Features idempotent deployment, policy-as-code validation, and continuous compliance auditing via GitHub Actions.
Lightweight log scanner to flag brute-force attempts and high-volume hostile IP activity.
Python script to detect brute force SSH login attempts from raw logs
A one-click script to update and harden your Linux VPS or server. Supports: - Ubuntu - Debian - CentOS - AlmaLinux
SH sur Debian : guide de durcissement, bonnes pratiques, audit et supervision des connexions.
π Monitor SSH logs in real-time, detect brute-force attacks, and visualize geo-attacks with this Splunk dashboard for enhanced security insights.
Add a description, image, and links to the ssh-security topic page so that developers can more easily learn about it.
To associate your repository with the ssh-security topic, visit your repo's landing page and select "manage topics."