Skip to content
Avatar
👾
👾

Achievements

Achievements

Block or Report

Block or report konstruktoid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
konstruktoid/README.md

Hi There!

GitHub stats

This here is a collection of freely available open-source software and documentation.

For example, if you're interested in ideas on how to make your servers a bit more secure, the hardening repository may be a good start. Or perhaps the Packer template or Ansible playbook might help as well.

Or are you in the need of a 1.84MB NGINX container image? Then the NGINX build repository will fix that for you.

Please note that because of the changes to Docker Automated Builds many Docker images are now outdated and a manual build is required and recommended.

If you're into honeypots and password lists, have a look at konstruktoid/ansible-cowrie-rootless.

If you'd like to support the development of current and future projects, or just to say thanks, please sponsor me here on GitHub.

Do not use any code available without first testing in a non-operational environment.

Trust me as much as you trust your eighth level dependencies.

Keybase LinkedIn Matrix Telegram

Publications

Writer

Using HashiCorp Vault as a dynamic Ansible inventory and authentication service
Running a NGINX container using rootless Docker with Ansible
Building a bastion, or an example on how to lock down a website using Ansible and Docker
Comparing the DISA STIG and CIS Benchmark values
Using Ansible custom, or local, facts
Enforcing a Docker container security policy presented at LinuxCon+ContainerCon Europe 2016
Enforcing SSH key policies using Ansible

Contributor

CIS Distribution Independent Linux
CIS Docker Benchmark
CIS Red Hat Enterprise Linux Benchmark
CIS Ubuntu Linux LTS Benchmark

Pinned

  1. hardening Public

    Hardening Ubuntu. Systemd edition.

    Shell 885 173

  2. Ansible role to apply a security baseline. Systemd edition.

    Jinja 267 63

  3. Ansible role to install a rootless Docker server

    Jinja 16 10

  4. A GitHub action that checks Python code using black, safety and flake8.

    Dockerfile 6 3

  5. tymely Public

    tymely is a application used to set system date and time using HTTP-date.

    Python 4

  6. The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.

    Shell 7.7k 879

879 contributions in the last year

Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr Mon Wed Fri

Contribution activity

April 2022

Created a pull request in slsa-framework/slsa that received 1 comment

Bump minimist from 1.2.5 to 1.2.6

GHSA-xvch-5gv4-984h Bumps minimist from 1.2.5 to 1.2.6. Release notes Commits updated-dependencies: dependency-name: minimist dependency-type: …

+6 −6 1 comment
Opened 23 other pull requests in 12 repositories
konstruktoid/ansible-cowrie-rootless 6 merged
konstruktoid/ansible-docker-rootless 4 merged
konstruktoid/ansible-role-hardening 3 merged
konstruktoid/hardening-geniso 2 merged
konstruktoid/ansible-hvault-inventory 1 merged
konstruktoid/ansible-cacheview 1 merged
konstruktoid/ansible-lastpass-inventory 1 merged
konstruktoid/datadog-package-updates 1 merged
konstruktoid/disruella 1 merged
konstruktoid/tymely 1 merged
konstruktoid/hardening 1 merged
t2d/ansible-docker-rootless 1 closed
Reviewed 3 pull requests in 2 repositories
pycontribs/python-vagrant 2 pull requests
konstruktoid/ansible-docker-rootless 1 pull request
Opened 1 issue in 1 repository
Checkmarx/homebrew-tap 1 open

Seeing something unexpected? Take a look at the GitHub profile guide.