4 tools and resources
A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.
Emulates Docker HTTP API with event logging and AWS deployment script.
A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.
An evolving how-to guide for securing a Linux server with detailed steps and explanations.