Stronghold Logo

Stronghold

0
Free
Visit Website

Stronghold is the easiest way to securely configure your Mac. Designed for macOS Sierra and High Sierra. Not yet tested on macOS Mojave, but I'm working on updating it! Usage: stronghold.py [OPTIONS] Securely configure your Mac. Developed by Aaron Lichtman -> (Github: alichtman) Options: -lockdown Set secure configuration without user interaction. -v Display version and author information and exit. -help, -h Show this message and exit. Installation Options: Install with pip $ pip install stronghold $ stronghold Download the stronghold binary from Releases tab. Configuration Options: Firewall - Turn on Firewall? This helps protect your Mac from being attacked over the internet. Turn on logging? If there IS an infection, logs are useful for determining the source. Turn on stealth mode? Your Mac will not respond to ICMP ping requests or connection attempts from closed TCP and UDP networks. General System Protection: Enable Gatekeeper? Defend against malware by enforcing code signing and verifying downloaded applications before allowing them to run. Prevent automatic software whitelisting? Both built-in and downloaded software will require user approval for whitelisting. Disable Capti

FEATURES

ALTERNATIVES

A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.

A System for Abuse- and Incident Handling with log file analysis capabilities.

Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

Check if your email address has been involved in a data breach.

Scalable, cost-effective application recovery to AWS.

A PHP based web application for managing postmortems with pluggable features.

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved