You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Robust Hosting with Advanced Security: Successfully hosted a secure website on AWS, implementing robust security measures including firewalls, IDS, MFA, and safeguards against SQL injection and XSS.
Robust Hosting with Advanced Security: Successfully hosted a secure website on AWS, implementing robust security measures including firewalls, IDS, MFA, and safeguards against SQL injection and XSS, ensuring comprehensive protection.
In this assignment, we work with network scanning and iptables rules. Iptables are used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains.
Optimal IPTables Configuration for Attack Mitigation This project aims to design and implement the best IPTables configurations to defend against various cyber attacks. It includes analyzing threats, creating tailored rules for prevention, and ensuring system security while balancing performance and reducing false positives.
An interactive shell script for managing IPTables with a menu-based terminal UI. Features include rule management, port forwarding, network segment creation, rule import/export, and security-focused design with command injection prevention. Supports loading rules from files or URLs, flushing and saving rules, and easy navigation.