Skip to content

Instantly share code, notes, and snippets.

View adampielak's full-sized avatar
💭
███▓▒░░. LiNUX .░░▒▓███

Adam Pielak adampielak

💭
███▓▒░░. LiNUX .░░▒▓███
View GitHub Profile
@adampielak
adampielak / gist9-filebeat-logging.yml
Created December 3, 2025 12:11 — forked from williamzujkowski/gist9-filebeat-logging.yml
Container Security - Filebeat Log Aggregation (Wazuh Integration)
# Filebeat configuration for container log aggregation
# Ship container logs to Wazuh for centralized monitoring
# Tags: container-security, logging, wazuh, filebeat
filebeat.inputs:
- type: container
paths:
- /var/lib/docker/containers/*/*.log
processors:
- add_docker_metadata:
@adampielak
adampielak / cis-benchmark-scanning.sh
Created December 3, 2025 12:10 — forked from williamzujkowski/cis-benchmark-scanning.sh
CIS benchmark scanning commands for Docker and Kubernetes security auditing
#!/bin/bash
# Docker Bench Security
git clone https://github.com/docker/docker-bench-security.git
cd docker-bench-security
sudo sh docker-bench-security.sh
# Kubernetes kube-bench
kubectl apply -f https://raw.githubusercontent.com/aquasecurity/kube-bench/main/job.yaml
kubectl logs job/kube-bench
@adampielak
adampielak / ai-docker-compose.yml
Created December 3, 2025 12:09 — forked from williamzujkowski/ai-docker-compose.yml
Docker Compose configuration for isolated AI experiment environment with network isolation and resource limits
# Docker Compose for isolated AI environment
# Provides network isolation and resource limits for AI experiments
services:
ai-sandbox:
image: pytorch/pytorch:latest
container_name: ai-experiment
networks:
- ai-isolated
volumes:
@adampielak
adampielak / ai-firewall-rules.sh
Created December 3, 2025 12:09 — forked from williamzujkowski/ai-firewall-rules.sh
Network segmentation firewall rules for AI VLAN using iptables
#!/bin/bash
# Dream Machine Professional firewall rules for AI VLAN
# Network segmentation for AI workloads
# AI VLAN Configuration
AI_VLAN="10.0.50.0/24"
INTERNAL_REPO="10.0.10.5"
# Allow: AI VLAN -> Internal model repository
iptables -A FORWARD -s $AI_VLAN -d $INTERNAL_REPO -j ACCEPT
@adampielak
adampielak / secure-model-loader.py
Created December 3, 2025 12:08 — forked from williamzujkowski/secure-model-loader.py
Verify ML model integrity with checksums before loading to prevent tampering
import torch
import hashlib
from pathlib import Path
from typing import Optional
class SecureModelLoader:
"""Verify model integrity before loading."""
def __init__(self, trusted_hashes_file: str = "model_hashes.txt"):
self.trusted_hashes = self._load_trusted_hashes(trusted_hashes_file)
@adampielak
adampielak / prompt-security-filter.py
Created December 3, 2025 12:08 — forked from williamzujkowski/prompt-security-filter.py
Detect and block prompt injection attempts in LLM applications
import re
from typing import List
class PromptSecurityFilter:
"""Detect and block prompt injection attempts."""
def __init__(self):
self.blocked_patterns = [
r"ignore previous instructions",
r"disregard all prior",
@adampielak
adampielak / suricata-custom-rules-detection.rules
Created December 3, 2025 12:06 — forked from williamzujkowski/suricata-custom-rules-detection.rules
Suricata Custom Detection Rules - Port scanning, DNS anomalies, C2 beaconing, and data exfiltration detection
# Suricata Custom Detection Rules
# Location: /etc/suricata/rules/custom-local.rules
# Purpose: Custom rules for port scanning, DNS anomalies, C2, and exfiltration detection
# ============================================================================
# Port Scan Detection
# ============================================================================
# Detect Nmap SYN scan
alert tcp any any -> $HOME_NET any (msg:"SCAN Nmap SYN scan detected"; flags:S,12; threshold: type threshold, track by_src, count 20, seconds 10; classtype:attempted-recon; sid:1000001; rev:1;)
@adampielak
adampielak / suricata-installation-setup.sh
Created December 3, 2025 12:05 — forked from williamzujkowski/suricata-installation-setup.sh
Suricata IDS/IPS Installation and Initial Configuration - Ubuntu 24.04 homelab setup with rule management
#!/bin/bash
# Suricata IDS/IPS Installation and Initial Configuration
# For Ubuntu 24.04 - Homelab Network Traffic Analysis Setup
# ============================================================================
# Installation
# ============================================================================
# Install on Ubuntu 24.04
sudo add-apt-repository ppa:oisf/suricata-stable
@adampielak
adampielak / ai-resource-monitor.py
Created December 3, 2025 12:01 — forked from williamzujkowski/ai-resource-monitor.py
Monitor GPU and CPU usage for AI workloads to detect anomalous behavior
import psutil
import GPUtil
import logging
from datetime import datetime
from typing import List, Dict
logger = logging.getLogger(__name__)
class AIResourceMonitor:
"""Monitor AI workload resource usage and detect anomalies."""
@adampielak
adampielak / suricata-advanced-lua-detection.lua
Created December 3, 2025 11:51 — forked from williamzujkowski/suricata-advanced-lua-detection.lua
Suricata Advanced Lua Detection - HTTP anomaly detection using Lua scripting and ML dataset configuration
-- Suricata Advanced Detection with Lua Scripts
-- Location: /etc/suricata/lua/http-anomaly.lua
-- Purpose: Complex HTTP anomaly detection using Lua scripting
-- ============================================================================
-- HTTP Anomaly Detection Script
-- ============================================================================
function init(args)
local needs = {}