Skip to content

health-control

Health control system for Kodachi that includes network connectivity checks and system health monitoring

Version: 9.0.1 | Size: 29.2MB | Author: Warith Al Maawali

License: Proprietary | Website: https://www.digi77.com


File Information

Property Value
Binary Name health-control
Version 9.0.1
Build Date 2025-09-23T19:19:59.326373219Z
Rust Version 1.82.0
File Size 29.2MB
JSON Data View Raw JSON

SHA256 Checksum

e91c986c4c59f8e0dd53402fa55a1394960dc85a502f9af3d5124f8143363b6d

Features

Feature Description
Feature Network connectivity monitoring
Feature Internet traffic control
Feature Security hardening
Feature System integrity checking
Feature Offline system management

Security Features

Feature Description
Authentication Secure authentication with certificate pinning
Encryption TLS 1.3 for all network communications
Inputvalidation All inputs are validated and sanitized
Ratelimiting Built-in rate limiting for network operations

System Requirements

Requirement Value
OS Linux (Debian-based)
Privileges root/sudo for system operations
Dependencies OpenSSL, libcurl

Global Options

Flag Description
-h, --help Print help information
-v, --version Print version information
-n, --info Display detailed information
-e, --examples Show usage examples
--json Output in JSON format
--json-pretty Pretty-print JSON output with indentation
--json-human Enhanced JSON output with improved formatting (like jq)
--verbose Enable verbose output
--quiet Suppress non-essential output
--no-color Disable colored output
--config <FILE> Use custom configuration file
--timeout <SECS> Set timeout (default: 30)
--retry <COUNT> Retry attempts (default: 3)

Commands

Data Destruction

wipe-file

Securely wipe a file with multiple passes

Usage:

health-control wipe-file [OPTIONS]

Examples:

health-control wipe-file --file /path/to/file.txt
health-control wipe-file --file /path/to/file.txt --passes 7 --json

wipe-directory

Securely wipe an entire directory and its contents

Usage:

health-control wipe-directory [OPTIONS]

Examples:

health-control wipe-directory --path /tmp/sensitive_dir
health-control wipe-directory --path /path/to/directory --passes 7 --json

wipe-logs

Wipe system and application logs

Usage:

health-control wipe-logs [OPTIONS]

Examples:

health-control wipe-logs
health-control wipe-logs --type system
health-control wipe-logs --type all --json

wipe-batch

Batch wipe multiple files

Usage:

health-control wipe-batch [OPTIONS]

Examples:

health-control wipe-batch --paths /tmp/file1,/tmp/file2
health-control wipe-batch --paths /tmp/a,/tmp/b,/tmp/c --passes 5 --json

wipe-browser-data

Wipe browser data and history

Usage:

health-control wipe-browser-data [OPTIONS]

Examples:

health-control wipe-browser-data
health-control wipe-browser-data --browser firefox
health-control wipe-browser-data --browser all --json

wipe-free-space

Securely wipe free space on a device

Usage:

health-control wipe-free-space [OPTIONS]

Examples:

health-control wipe-free-space --device /dev/sda1
health-control wipe-free-space --device / --json

wipe-pattern

Set wipe pattern (dod, gutmann, random, zeros)

Usage:

health-control wipe-pattern [OPTIONS]

Examples:

health-control wipe-pattern --pattern dod
health-control wipe-pattern --pattern gutmann --json
health-control wipe-pattern --pattern random

wipe-schedule

Schedule automatic data wiping

Usage:

health-control wipe-schedule [OPTIONS]

Examples:

health-control wipe-schedule temp --frequency daily
health-control wipe-schedule logs --frequency weekly
health-control wipe-schedule browser --json

wipe-verify

Verify that a file was wiped properly

Usage:

health-control wipe-verify [OPTIONS]

Examples:

health-control wipe-verify --path /tmp/sensitive.txt
health-control wipe-verify --path /home/user/data.bin --json

Emergency Operations

kill-switch-arm

Arm the emergency kill switch - enables monitoring mode for automatic panic activation on security events (network intrusions, unauthorized access, system tampering). Does NOT take immediate action, only prepares system for rapid response.

Usage:

health-control kill-switch-arm [OPTIONS]

Examples:

health-control kill-switch-arm
health-control kill-switch-arm --json

kill-switch-disarm

Disarm the emergency kill switch

Usage:

health-control kill-switch-disarm [OPTIONS]

Examples:

health-control kill-switch-disarm
health-control kill-switch-disarm --json

kill-switch-status

Check if kill switch monitoring is armed/disarmed. Shows armed time, trigger count, and monitoring state. Does NOT activate anything - just displays current status.

Usage:

health-control kill-switch-status [OPTIONS]

Examples:

health-control kill-switch-status
health-control kill-switch-status --json

kill-switch-activate

IMMEDIATELY activate emergency procedures. Unlike 'arm' which monitors, this executes panic mode NOW. Choose level: soft (network+lock), medium (default: +kill processes), hard (+RAM wipe+shutdown)

Usage:

health-control kill-switch-activate [OPTIONS]

Examples:

health-control kill-switch-activate
health-control kill-switch-activate --level hard --force
health-control kill-switch-activate --level soft --json

panic-soft

IMMEDIATE soft panic mode. Actions: Kill all network connections, clear clipboard, lock screen. NO CONFIRMATION. Reversible by restarting network. Use for quick privacy protection.

Usage:

health-control panic-soft [OPTIONS]

Examples:

health-control panic-soft
health-control panic-soft --json

panic-hard

IMMEDIATE hard panic mode with CONFIRMATION. CRITICAL: Kill network, terminate ALL processes, wipe RAM with secure overwrite, shutdown in 1 minute. IRREVERSIBLE - system will shutdown!

Usage:

health-control panic-hard [OPTIONS]

Examples:

health-control panic-hard
health-control panic-hard --json

panic-medium

IMMEDIATE medium panic mode with CONFIRMATION. Actions: Kill network, terminate non-essential processes, clear memory, unmount devices, lock screen. Requires system restart to fully restore.

Usage:

health-control panic-medium [OPTIONS]

Examples:

health-control panic-medium
health-control panic-medium --json

panic-profile

Set panic profile (stealth, paranoid, recovery)

Usage:

health-control panic-profile [OPTIONS]

Examples:

health-control panic-profile --profile stealth
health-control panic-profile --profile paranoid --json
health-control panic-profile --profile recovery

panic-recover

Activate panic recovery mode

Usage:

health-control panic-recover [OPTIONS]

Examples:

health-control panic-recover
health-control panic-recover --json

create-recovery-point

Create system recovery checkpoint

Usage:

health-control create-recovery-point [OPTIONS]

Examples:

health-control create-recovery-point
health-control create-recovery-point --name pre-update
health-control create-recovery-point --json

Hardware Security

hardware-rng-verify

Verify hardware random number generator status

Usage:

health-control hardware-rng-verify [OPTIONS]

Examples:

health-control hardware-rng-verify
health-control hardware-rng-verify --json

entropy-status

Check system entropy pool status and quality

Usage:

health-control entropy-status [OPTIONS]

Examples:

health-control entropy-status
health-control entropy-status --json

coldboot-defense-enable

Enable cold boot defense mechanisms

Usage:

health-control coldboot-defense-enable [OPTIONS]

Examples:

health-control coldboot-defense-enable
health-control coldboot-defense-enable --json

coldboot-defense-disable

Disable cold boot defense mechanisms

Usage:

health-control coldboot-defense-disable [OPTIONS]

Examples:

health-control coldboot-defense-disable
health-control coldboot-defense-disable --json
health-control coldboot-defense-disable --json-human

boot-integrity-check

Check boot chain integrity and security status

Usage:

health-control boot-integrity-check [OPTIONS]

Examples:

health-control boot-integrity-check
health-control boot-integrity-check --json

Hostname Management

set-default-hostname

Set the default hostname

Usage:

health-control set-default-hostname [OPTIONS]

Examples:

health-control set-default-hostname
health-control set-default-hostname --json

set-random-hostname

Set a random hostname

Usage:

health-control set-random-hostname [OPTIONS]

Examples:

health-control set-random-hostname
health-control set-random-hostname --json

set-custom-hostname

Set a custom hostname

Usage:

health-control set-custom-hostname [OPTIONS]

Examples:

health-control set-custom-hostname --name MyHost
health-control set-custom-hostname --name secure-host --json

Internet Traffic Control

block-internet

Block all internet traffic

Usage:

health-control block-internet [OPTIONS]

Examples:

health-control block-internet
health-control block-internet --method firewall
health-control block-internet --method ufw
health-control block-internet --method iptables
health-control block-internet --method nftables
health-control block-internet --method interfaces
health-control block-internet --method all
health-control block-internet --allow-local
health-control block-internet --method iptables --allow-local
health-control block-internet --method all --allow-local
health-control block-internet --json

unblock-internet

Unblock internet traffic

Usage:

health-control unblock-internet [OPTIONS]

Examples:

health-control unblock-internet
health-control unblock-internet --method firewall
health-control unblock-internet --method ufw
health-control unblock-internet --method iptables
health-control unblock-internet --method nftables
health-control unblock-internet --method interfaces
health-control unblock-internet --method all
health-control unblock-internet --json

internet-status

Check internet blocking status

Usage:

health-control internet-status [OPTIONS]

Examples:

health-control internet-status
health-control internet-status --json

recover-internet

Recover internet connectivity

Usage:

health-control recover-internet [OPTIONS]

Examples:

health-control recover-internet
health-control recover-internet --check-dns
health-control recover-internet --force
health-control recover-internet --check-dns --force
health-control recover-internet --json

kill-network

Emergency network kill switch

Usage:

health-control kill-network [OPTIONS]

Examples:

health-control kill-network
health-control kill-network --json

kill-network-interface

Kill specific network interface

Usage:

health-control kill-network-interface [OPTIONS]

Examples:

health-control kill-network-interface --interface wlan0
health-control kill-network-interface --interface eth0 --json

kill-process

Kill specific process by name or PID

Usage:

health-control kill-process [OPTIONS]

Examples:

health-control kill-process --process firefox
health-control kill-process --process 1234 --json

MAC Address Management

mac-change-all

Change all MAC addresses

Usage:

health-control mac-change-all [OPTIONS]

Examples:

health-control mac-change-all
health-control mac-change-all --json

mac-force-change

Force change all MAC addresses (disable interfaces first)

Usage:

health-control mac-force-change [OPTIONS]

Examples:

health-control mac-force-change
health-control mac-force-change --json

mac-change-specific

Change specific interface MAC address

Usage:

health-control mac-change-specific [OPTIONS]

Examples:

health-control mac-change-specific --interface eth0
health-control mac-change-specific --interface wlan0 --json

mac-show-interfaces

Show available network interfaces

Usage:

health-control mac-show-interfaces [OPTIONS]

Examples:

health-control mac-show-interfaces
health-control mac-show-interfaces --json

mac-show-macs

Show current MAC addresses

Usage:

health-control mac-show-macs [OPTIONS]

Examples:

health-control mac-show-macs
health-control mac-show-macs --json

mac-reset-all

Reset all MAC addresses to default

Usage:

health-control mac-reset-all [OPTIONS]

Examples:

health-control mac-reset-all
health-control mac-reset-all --json

mac-active-interface

Show active network interface

Usage:

health-control mac-active-interface [OPTIONS]

Examples:

health-control mac-active-interface
health-control mac-active-interface --json

Memory Management

memory-clean

Clean memory caches and buffers

Usage:

health-control memory-clean [OPTIONS]

Examples:

health-control memory-clean
health-control memory-clean --json

memory-force-clean

Force clean memory by killing top process

Usage:

health-control memory-force-clean [OPTIONS]

Examples:

health-control memory-force-clean
health-control memory-force-clean --json

memory-wipe

Secure RAM wipe (sdmem)

Usage:

health-control memory-wipe [OPTIONS]

Examples:

health-control memory-wipe
health-control memory-wipe --json

memory-wipe-process

Wipe memory of specific process

Usage:

health-control memory-wipe-process [OPTIONS]

Examples:

health-control memory-wipe-process --value firefox
health-control memory-wipe-process --value 1234 --json

memory-limits

Manage process memory limits

Usage:

health-control memory-limits [OPTIONS]

Examples:

health-control memory-limits
health-control memory-limits --value firefox --limit 1024
health-control memory-limits --json

memory-stats

Display memory statistics and history

Usage:

health-control memory-stats [OPTIONS]

Examples:

health-control memory-stats
health-control memory-stats --history --json

swap-configure

Configure swap settings

Usage:

health-control swap-configure [OPTIONS]

Examples:

health-control swap-configure --swappiness 10 --cache-pressure 50
health-control swap-configure --swappiness 0 --json

disable-swap

Disable swap memory

Usage:

health-control disable-swap [OPTIONS]

Examples:

health-control disable-swap
health-control disable-swap --json

enable-swap

Enable swap memory

Usage:

health-control enable-swap [OPTIONS]

Examples:

health-control enable-swap
health-control enable-swap --size 2048
health-control enable-swap --json

ram-wipe-enable

Enable automatic RAM wiping on shutdown

Usage:

health-control ram-wipe-enable [OPTIONS]

Examples:

health-control ram-wipe-enable
health-control ram-wipe-enable --schedule immediate
health-control ram-wipe-enable --passes 5 --json

ram-wipe-disable

Disable automatic RAM wiping

Usage:

health-control ram-wipe-disable [OPTIONS]

Examples:

health-control ram-wipe-disable
health-control ram-wipe-disable --preserve-config
health-control ram-wipe-disable --json

Network Connectivity

net-check

Check network connectivity (IP and DNS only)

Usage:

health-control net-check [--timeout <SECONDS>] [--http] [--ip-only] [--domain-only]

Options: - --timeout <SECONDS>: Timeout in seconds for each connectivity check - --http: Include HTTP connectivity check - --ip-only: Check IP connectivity only, skip DNS checks - --domain-only: Check domain connectivity only, skip IP ping

Examples:

health-control net-check
health-control net-check --json
health-control net-check --timeout 15
health-control net-check --http --json
health-control net-check --ip-only
health-control net-check --domain-only

net-check-http

Check network connectivity including HTTP

Usage:

health-control net-check-http [OPTIONS]

Examples:

health-control net-check-http
health-control net-check-http --timeout 15
health-control net-check-http --json

list-ips

List IPs used for connectivity testing

Usage:

health-control list-ips [OPTIONS]

Examples:

health-control list-ips
health-control list-ips --json

list-domains

List domains used for connectivity testing

Usage:

health-control list-domains [OPTIONS]

Examples:

health-control list-domains
health-control list-domains --json

Offline Actions

offline-bluetooth

Enable/disable/check Bluetooth service

Usage:

health-control offline-bluetooth [OPTIONS]

Examples:

health-control offline-bluetooth --action disable
health-control offline-bluetooth --action enable
health-control offline-bluetooth --action check --json

offline-wifi

Manage WiFi connectivity

Usage:

health-control offline-wifi [OPTIONS]

Examples:

health-control offline-wifi --action disable
health-control offline-wifi --action enable
health-control offline-wifi --action check --json

offline-usb-storage

Manage USB storage devices

Usage:

health-control offline-usb-storage [OPTIONS]

Examples:

health-control offline-usb-storage --action disable
health-control offline-usb-storage --action enable
health-control offline-usb-storage --action check --json

offline-webcam

Manage webcam device

Usage:

health-control offline-webcam [OPTIONS]

Examples:

health-control offline-webcam --action disable
health-control offline-webcam --action enable
health-control offline-webcam --action check --json

offline-microphone

Manage microphone device

Usage:

health-control offline-microphone [OPTIONS]

Examples:

health-control offline-microphone --action disable
health-control offline-microphone --action enable
health-control offline-microphone --action check --json

offline-systemlogs

Manage system logging

Usage:

health-control offline-systemlogs [OPTIONS]

Examples:

health-control offline-systemlogs --action disable
health-control offline-systemlogs --action enable
health-control offline-systemlogs --action check --json

offline-cups

Manage CUPS printing service

Usage:

health-control offline-cups [OPTIONS]

Examples:

health-control offline-cups --action disable  # Disable printer service (CUPS)
health-control offline-cups --action enable   # Enable printer service (CUPS)
health-control offline-cups --action check --json

offline-networkmanager

Manage NetworkManager service

Usage:

health-control offline-networkmanager [OPTIONS]

Examples:

health-control offline-networkmanager --action disable
health-control offline-networkmanager --action enable
health-control offline-networkmanager --action check --json

offline-numlock

Manage NumLock configuration

Usage:

health-control offline-numlock [OPTIONS]

Examples:

health-control offline-numlock --action enable
health-control offline-numlock --action disable
health-control offline-numlock --action check --json

offline-cmdhistory

Manage command history

Usage:

health-control offline-cmdhistory [OPTIONS]

Examples:

health-control offline-cmdhistory --action disable
health-control offline-cmdhistory --action enable
health-control offline-cmdhistory --action check --json

offline-autologin

Enable/disable/check auto-login functionality

Usage:

health-control offline-autologin [OPTIONS]

Examples:

health-control offline-autologin --action disable
health-control offline-autologin --action enable
health-control offline-autologin --action check --json

offline-screen-lock

Manage screen locking

Usage:

health-control offline-screen-lock [OPTIONS]

Examples:

health-control offline-screen-lock --action enable
health-control offline-screen-lock --action disable
health-control offline-screen-lock --action check --json

offline-fdlimit

Enable/disable/check file descriptor limits

Usage:

health-control offline-fdlimit [OPTIONS]

Examples:

health-control offline-fdlimit --action enable --soft-limit 1024 --hard-limit 4096
health-control offline-fdlimit --action disable
health-control offline-fdlimit --action check --json

offline-netoptimize

Enable/disable/check network optimization

Usage:

health-control offline-netoptimize [OPTIONS]

Examples:

health-control offline-netoptimize --action enable
health-control offline-netoptimize --action disable
health-control offline-netoptimize --action check --json

offline-bbr

Enable/disable/check BBR congestion control

Usage:

health-control offline-bbr [OPTIONS]

Examples:

health-control offline-bbr --action enable
health-control offline-bbr --action disable
health-control offline-bbr --action check --json

offline-ifspeed

Enable/disable/check interface speed optimization

Usage:

health-control offline-ifspeed [OPTIONS]

Examples:

health-control offline-ifspeed --action enable --interface eth0 --speed 1000
health-control offline-ifspeed --action disable
health-control offline-ifspeed --action check --json
health-control offline-ifspeed --action enable --interface wlan0

offline-avahi

Manage Avahi daemon service

Usage:

health-control offline-avahi [OPTIONS]

Examples:

health-control offline-avahi --action disable
health-control offline-avahi --action enable
health-control offline-avahi --action check --json

offline-modem-manager

Manage ModemManager service

Usage:

health-control offline-modem-manager [OPTIONS]

Examples:

health-control offline-modem-manager --action disable
health-control offline-modem-manager --action enable
health-control offline-modem-manager --action check --json

offline-ssh

Manage SSH daemon service

Usage:

health-control offline-ssh [OPTIONS]

Examples:

health-control offline-ssh --action disable
health-control offline-ssh --action enable
health-control offline-ssh --action check --json

offline-apache

Manage Apache web server service

Usage:

health-control offline-apache [OPTIONS]

Examples:

health-control offline-apache --action disable
health-control offline-apache --action enable
health-control offline-apache --action check --json

offline-nginx

Manage Nginx web server service

Usage:

health-control offline-nginx [OPTIONS]

Examples:

health-control offline-nginx --action disable
health-control offline-nginx --action enable
health-control offline-nginx --action check --json

offline-docker

Manage Docker container service

Usage:

health-control offline-docker [OPTIONS]

Examples:

health-control offline-docker --action disable
health-control offline-docker --action enable
health-control offline-docker --action check --json

offline-mysql

Manage MySQL database service

Usage:

health-control offline-mysql [OPTIONS]

Examples:

health-control offline-mysql --action disable
health-control offline-mysql --action enable
health-control offline-mysql --action check --json

offline-postgresql

Manage PostgreSQL database service

Usage:

health-control offline-postgresql [OPTIONS]

Examples:

health-control offline-postgresql --action disable
health-control offline-postgresql --action enable
health-control offline-postgresql --action check --json

Security

security-status

Show comprehensive security status

Usage:

health-control security-status [OPTIONS]

Examples:

health-control security-status
health-control security-status --category network
health-control security-status --category all --json
health-control security-status all
health-control security-status network --json

Security Assessment

security-score

Calculate security score and get recommendations

Usage:

health-control security-score [OPTIONS]

Examples:

health-control security-score
health-control security-score --json

security-report

Generate comprehensive security report

Usage:

health-control security-report [OPTIONS]

Examples:

health-control security-report
health-control security-report --format detailed
health-control security-report --format compliance --json

security-profile

Set security profile and thresholds

Usage:

health-control security-profile [OPTIONS]

security-history

View security configuration history

Usage:

health-control security-history [OPTIONS]

Examples:

health-control security-history
health-control security-history --days 30
health-control security-history --json

security-remediate

Auto-remediate security issues

Usage:

health-control security-remediate [OPTIONS]

Examples:

health-control security-remediate
health-control security-remediate --bool true
health-control security-remediate --bool false --json

security-schedule

Schedule security scans (hourly, daily, weekly, monthly, disable)

Usage:

health-control security-schedule [OPTIONS]

Examples:

health-control security-schedule --value daily
health-control security-schedule --value weekly
health-control security-schedule --value disable --json

rootkit-scan-enhanced

Enhanced rootkit scanning with multiple tools

Usage:

health-control rootkit-scan-enhanced [OPTIONS]

Examples:

health-control rootkit-scan-enhanced
health-control rootkit-scan-enhanced --deep
health-control rootkit-scan-enhanced --json

lynis-audit

Run Lynis security audit

Usage:

health-control lynis-audit [OPTIONS]

Examples:

health-control lynis-audit
health-control lynis-audit --value quick
health-control lynis-audit --value pentest --json

lynis-status

Check Lynis installation status

Usage:

health-control lynis-status [OPTIONS]

Examples:

health-control lynis-status
health-control lynis-status --json

clamav-scan

Scan system with ClamAV antivirus

Usage:

health-control clamav-scan [OPTIONS]

Examples:

health-control clamav-scan
health-control clamav-scan --path /home --recursive
health-control clamav-scan --quarantine --json

system-audit

Perform comprehensive system security audit

Usage:

health-control system-audit [OPTIONS]

Examples:

health-control system-audit
health-control system-audit --level comprehensive
health-control system-audit --modules network,filesystem --json

Security Hardening

security-harden

Apply comprehensive security hardening

Usage:

health-control security-harden [OPTIONS]

Examples:

health-control security-harden
health-control security-harden --profile paranoid
health-control security-harden --modules kernel,network --json

security-verify

Verify if security hardening is properly applied (checks all 7 modules and reports their status)

Usage:

health-control security-verify [OPTIONS]

Examples:

health-control security-verify
  # Check status of all 7 security modules:
  # - kernel: sysctl hardening (kptr_restrict, dmesg_restrict, etc.)
  # - process: isolation settings (hidepid, namespaces)
  # - filesystem: secure mount options (nosuid, nodev)
  # - network: firewall settings (tcp_syncookies, ip_forward)
  # - memory: protection (ASLR, protected symlinks/hardlinks)
  # - monitoring: auditd and syslog status
  # - sandboxing: AppArmor and seccomp availability
  # Shows: ENABLED/DISABLED and if properly configured

health-control security-verify --profile paranoid
  # Verify against paranoid profile expectations

health-control security-verify --json
  # Get detailed JSON output with all verification data

security-recover

Temporarily revert security hardening (keeps framework enabled for quick re-hardening)

Usage:

health-control security-recover [OPTIONS]

Examples:

# Temporarily revert security hardening (keeps framework ready for re-hardening)
sudo health-control security-recover

# After recovery, modules show 'ENABLED (needs configuration)'
# This means: Framework is ready but no restrictions are enforced
# Use this when: Troubleshooting issues, planning to re-harden later

# Recover only specific modules
sudo health-control security-recover --modules network,kernel

# To re-apply hardening after recovery:
sudo health-control security-harden

security-reset

Completely disable all security modules and framework (permanent removal)

Usage:

health-control security-reset [OPTIONS]

Examples:

# Completely disable all security modules and framework
sudo health-control security-reset

# After reset, modules show 'DISABLED'
# This means: All security framework is completely turned off
# Use this when: You want to permanently remove security hardening

# Skip confirmation prompt
sudo health-control security-reset --force

# Warning: After reset, security-harden will need to rebuild framework

monitoring-enable

Enable system monitoring features

Usage:

health-control monitoring-enable [OPTIONS]

Examples:

health-control monitoring-enable
health-control monitoring-enable --modules auditd,lkrg,file-integrity
health-control monitoring-enable --json

monitoring-disable

Disable system monitoring features

Usage:

health-control monitoring-disable [OPTIONS]

Examples:

health-control monitoring-disable
health-control monitoring-disable --modules auditd,lkrg
health-control monitoring-disable --json

ipv6-disable

Disable IPv6 system-wide

Usage:

health-control ipv6-disable [OPTIONS]

Examples:

health-control ipv6-disable
health-control ipv6-disable --json

ipv6-enable

Enable IPv6 system-wide

Usage:

health-control ipv6-enable [OPTIONS]

Examples:

health-control ipv6-enable
health-control ipv6-enable --json

tirdad-enable

Enable Tirdad TCP ISN randomization

Usage:

health-control tirdad-enable [OPTIONS]

Examples:

health-control tirdad-enable
health-control tirdad-enable --json

tirdad-disable

Disable Tirdad TCP ISN randomization

Usage:

health-control tirdad-disable [OPTIONS]

Examples:

health-control tirdad-disable
health-control tirdad-disable --json

tirdad-status

Check Tirdad TCP ISN randomization status

Usage:

health-control tirdad-status [OPTIONS]

Examples:

health-control tirdad-status
health-control tirdad-status --json

ipv6-status

Check IPv6 status

Usage:

health-control ipv6-status [OPTIONS]

Examples:

health-control ipv6-status
health-control ipv6-status --json

ram-wipe

Enable secure RAM wiping on shutdown

Usage:

health-control ram-wipe [OPTIONS]

Examples:

health-control ram-wipe
health-control ram-wipe --json

ram-wipe-status

Check RAM wipe configuration and status

Usage:

health-control ram-wipe-status [OPTIONS]

Examples:

health-control ram-wipe-status
health-control ram-wipe-status --json

disk-encryption-status

Check disk encryption status and security

Usage:

health-control disk-encryption-status [OPTIONS]

Examples:

health-control disk-encryption-status
health-control disk-encryption-status --json

swap-enable

Enable swap partition/file

Usage:

health-control swap-enable [OPTIONS]

Examples:

health-control swap-enable
health-control swap-enable --json

swap-disable

Disable swap partition/file

Usage:

health-control swap-disable [OPTIONS]

Examples:

health-control swap-disable
health-control swap-disable --json

swap-encrypt

Encrypt swap partition/file

Usage:

health-control swap-encrypt [OPTIONS]

Examples:

health-control swap-encrypt
health-control swap-encrypt --json

swap-status

Check swap status and configuration

Usage:

health-control swap-status [OPTIONS]

Examples:

health-control swap-status
health-control swap-status --json

swap-decrypt

Decrypt encrypted swap partition/file

Usage:

health-control swap-decrypt [OPTIONS]

Examples:

health-control swap-decrypt
health-control swap-decrypt --device /dev/sda3
health-control swap-decrypt --json

swap-encrypt-status

Check swap encryption status

Usage:

health-control swap-encrypt-status [OPTIONS]

Examples:

health-control swap-encrypt-status
health-control swap-encrypt-status --json

usb-list

List all USB devices

Usage:

health-control usb-list [OPTIONS]

Examples:

health-control usb-list
health-control usb-list --json

luks-nuke

Manage LUKS nuke passwords

Usage:

health-control luks-nuke [OPTIONS]

Examples:

health-control luks-nuke --action status
health-control luks-nuke --action status --device /dev/sda5
health-control luks-nuke --action configure --device /dev/sda5
health-control luks-nuke --action configure --device /dev/sda5 --password nuke123
health-control luks-nuke --action remove --device /dev/sda5

luks-manage

Manage LUKS encrypted devices

Usage:

health-control luks-manage [OPTIONS]

Examples:

health-control luks-manage --action list
health-control luks-manage --action unlock --device /dev/sdb1
health-control luks-manage --action lock --device /dev/sdb1

luks-nuke-advanced

Advanced LUKS nuke configuration (emergency wipe)

Usage:

health-control luks-nuke-advanced [OPTIONS]

Examples:

health-control luks-nuke-advanced --device /dev/sdb1 --password EMERGENCY
health-control luks-nuke-advanced --device /dev/sda2 --json

luks-remove

Remove LUKS encryption from device

Usage:

health-control luks-remove [OPTIONS]

Examples:

health-control luks-remove /dev/sdb1
health-control luks-remove /dev/sdb1 --force

luks-manage-advanced

Advanced LUKS device management

Usage:

health-control luks-manage-advanced [OPTIONS]

Examples:

health-control luks-manage-advanced --action backup-header --device /dev/sdb1 --backup-file /tmp/header.backup
health-control luks-manage-advanced --action restore-header --device /dev/sdb1 --backup-file /tmp/header.backup
health-control luks-manage-advanced --action add-key --device /dev/sdb1 --key-file /tmp/newkey

create-persistence

Create encrypted persistence file

Usage:

health-control create-persistence [OPTIONS]

Examples:

health-control create-persistence --size 8 --encrypted
health-control create-persistence --size 4 --output /tmp/persistence.img --json

encryption-status

Check storage encryption status

Usage:

health-control encryption-status [OPTIONS]

Examples:

health-control encryption-status
health-control encryption-status --json

container-create

Create encrypted container

Usage:

health-control container-create [OPTIONS]

Examples:

health-control container-create --path /tmp/container.img --size 2048 --fs-type luks

container-mount

Mount encrypted container

Usage:

health-control container-mount [OPTIONS]

Examples:

health-control container-mount --container /path/to/container.img --mount-point /mnt/container

container-unmount

Unmount encrypted container

Usage:

health-control container-unmount [OPTIONS]

Examples:

health-control container-unmount --mount-point /mnt/container

Security Tools

rootkit-scan

Quick rootkit scan (fast, essential checks)

Usage:

health-control rootkit-scan [OPTIONS]

Examples:

health-control rootkit-scan
health-control rootkit-scan --json

kloak-status

Check Kloak keyboard anonymization status

Usage:

health-control kloak-status [OPTIONS]

Examples:

health-control kloak-status
health-control kloak-status --json

kloak-enable

Enable Kloak keyboard anonymization

Usage:

health-control kloak-enable [OPTIONS]

Examples:

health-control kloak-enable
health-control kloak-enable --json

kloak-disable

Disable Kloak keyboard anonymization

Usage:

health-control kloak-disable [OPTIONS]

Examples:

health-control kloak-disable
health-control kloak-disable --json

kloak-configure

Configure Kloak keystroke anonymization settings

Usage:

health-control kloak-configure [OPTIONS]

Examples:

health-control kloak-configure --delay 100
health-control kloak-configure --mode aggressive --jitter 50
health-control kloak-configure --json

kloak-event-mode

Set Kloak event processing mode

Usage:

health-control kloak-event-mode [OPTIONS]

Examples:

health-control kloak-event-mode --mode raw
health-control kloak-event-mode --mode filtered
health-control kloak-event-mode --mode adaptive --json

kloak-stats

Show Kloak keystroke anonymization statistics

Usage:

health-control kloak-stats [OPTIONS]

Examples:

health-control kloak-stats
health-control kloak-stats --reset
health-control kloak-stats --json

aide-update

Update AIDE database after legitimate changes

Usage:

health-control aide-update [OPTIONS]

Examples:

health-control aide-update
health-control aide-update --accept-changes
health-control aide-update --json

aide-check

Check file integrity with AIDE

Usage:

health-control aide-check [OPTIONS]

Examples:

health-control aide-check
health-control aide-check --json

aide-init

Initialize AIDE database for file integrity monitoring

Usage:

health-control aide-init [OPTIONS]

Examples:

health-control aide-init
health-control aide-init --config ./aide.conf
health-control aide-init --timeout 7200
health-control aide-init --background
health-control aide-init --json

aide-reinit

Reinitialize AIDE database (reset baseline)

Usage:

health-control aide-reinit [OPTIONS]

Examples:

health-control aide-reinit
health-control aide-reinit --force
health-control aide-reinit --json

aide-scan-dir

Scan specific directory with AIDE

Usage:

health-control aide-scan-dir [OPTIONS]

Examples:

health-control aide-scan-dir ./config
health-control aide-scan-dir /usr/bin --recursive
health-control aide-scan-dir /home --json

Storage Security

storage-wipe

Securely wipe storage devices and free space

Usage:

health-control storage-wipe [OPTIONS]

Examples:

health-control storage-wipe --free-space
health-control storage-wipe --device /dev/sdb --json

storage-encrypt

Encrypt a storage device

Usage:

health-control storage-encrypt [OPTIONS]

Examples:

health-control storage-encrypt --device /dev/sdb1
health-control storage-encrypt --device /dev/sdc --json

encryption-tune

Optimize encryption performance and security settings

Usage:

health-control encryption-tune [OPTIONS]

Examples:

health-control encryption-tune
health-control encryption-tune --profile performance --benchmark
health-control encryption-tune --cipher aes-xts-plain64 --key-size 256 --device /dev/sdb1
health-control encryption-tune --profile security --iter-time 5000 --apply
health-control encryption-tune --json

System Control

get-hostname

Get the current hostname

Usage:

health-control get-hostname

Examples:

health-control get-hostname
health-control get-hostname --json

change-hostname

Change hostname (prompts for new hostname)

Usage:

health-control change-hostname [OPTIONS]

Examples:

health-control change-hostname
health-control change-hostname new-hostname
health-control change-hostname --json

list-hostnames

List available hostnames by category

Usage:

health-control list-hostnames [OPTIONS]

Examples:

health-control list-hostnames
health-control list-hostnames --category all
health-control list-hostnames --category windows
health-control list-hostnames --category linux
health-control list-hostnames --category apple
health-control list-hostnames --category network
health-control list-hostnames --category mobile
health-control list-hostnames --category iot
health-control list-hostnames --category gaming
health-control list-hostnames --category fiction
health-control list-hostnames --json

set-random-hostname-category

Set a random hostname from a specific category

Usage:

health-control set-random-hostname-category [OPTIONS]

Examples:

sudo health-control set-random-hostname-category
sudo health-control set-random-hostname-category --category windows
sudo health-control set-random-hostname-category --category linux
sudo health-control set-random-hostname-category --category apple
sudo health-control set-random-hostname-category --category network
sudo health-control set-random-hostname-category --category fiction --json

get-logged-user

Get the actual logged-in user (handles sudo correctly)

Usage:

health-control get-logged-user [OPTIONS]

Examples:

health-control get-logged-user
health-control get-logged-user --json
sudo health-control get-logged-user
sudo health-control get-logged-user --json-pretty

show-timezone

Show current system timezone

Usage:

health-control show-timezone [OPTIONS]

Examples:

health-control show-timezone
health-control show-timezone --json

sync-timezone

Sync timezone based on IP geolocation

Usage:

health-control sync-timezone [OPTIONS]

Examples:

health-control sync-timezone
health-control sync-timezone --json

show-remote-timezone

Show timezone based on current IP location

Usage:

health-control show-remote-timezone [OPTIONS]

Examples:

health-control show-remote-timezone
health-control show-remote-timezone --json

set-timezone

Set system timezone

Usage:

health-control set-timezone [OPTIONS]

Examples:

health-control set-timezone --timezone America/New_York
health-control set-timezone --timezone Europe/London
health-control set-timezone --timezone Asia/Tokyo --json
health-control set-timezone --value America/Chicago

list-timezones

List available timezones by category

Usage:

health-control list-timezones [OPTIONS]

Examples:

health-control list-timezones
health-control list-timezones --category all
health-control list-timezones --category africa
health-control list-timezones --category americas
health-control list-timezones --category asia
health-control list-timezones --category europe
health-control list-timezones --category australia
health-control list-timezones --category pacific
health-control list-timezones --category utc
health-control list-timezones --json

set-random-timezone

Set a random timezone from a specific category

Usage:

health-control set-random-timezone [OPTIONS]

Examples:

sudo health-control set-random-timezone
sudo health-control set-random-timezone --category americas
sudo health-control set-random-timezone --category europe
sudo health-control set-random-timezone --category asia
sudo health-control set-random-timezone --category africa
sudo health-control set-random-timezone --category pacific --json

play-sound

Play notification sound

Usage:

health-control play-sound [OPTIONS]

Examples:

health-control play-sound
health-control play-sound --sound alert
health-control play-sound success
health-control play-sound warning -m mp3
health-control play-sound alert --debug

notify

Send desktop notification

Usage:

health-control notify [OPTIONS]

Examples:

health-control notify --message "Security check complete"
health-control notify --message "Hello from Kodachi"
health-control notify --message "Alert" --body "VPN connected"
health-control notify --message "Warning" --urgency critical --duration 30
health-control notify --message "Update" --notify-icon "/path/to/icon.png"

System Information

offline-info-system

Display comprehensive system information

Usage:

health-control offline-info-system [OPTIONS]

Examples:

health-control offline-info-system
health-control offline-info-system --json

offline-info-hardware

Display hardware information

Usage:

health-control offline-info-hardware [OPTIONS]

Examples:

health-control offline-info-hardware
health-control offline-info-hardware --json

offline-info-process

Display process information

Usage:

health-control offline-info-process [OPTIONS]

Examples:

health-control offline-info-process
health-control offline-info-process --json

offline-info-security

Display security and encryption status

Usage:

health-control offline-info-security [OPTIONS]

Examples:

health-control offline-info-security
health-control offline-info-security --json

offline-info-network

Display network information

Usage:

health-control offline-info-network [OPTIONS]

Examples:

health-control offline-info-network
health-control offline-info-network --json

offline-info-user

Display user information

Usage:

health-control offline-info-user [OPTIONS]

Examples:

health-control offline-info-user
health-control offline-info-user --json

offline-info-storage

Display storage information

Usage:

health-control offline-info-storage [OPTIONS]

Examples:

health-control offline-info-storage
health-control offline-info-storage --json

offline-info-services

Display system services information

Usage:

health-control offline-info-services [OPTIONS]

Examples:

health-control offline-info-services
health-control offline-info-services --json

offline-info-all

Display all system information

Usage:

health-control offline-info-all [OPTIONS]

Examples:

health-control offline-info-all
health-control offline-info-all --json

System Maintenance

auto-updates-enable

Enable automatic security updates

Usage:

health-control auto-updates-enable [OPTIONS]

Examples:

health-control auto-updates-enable
health-control auto-updates-enable --json

auto-updates-disable

Disable automatic security updates

Usage:

health-control auto-updates-disable [OPTIONS]

Examples:

health-control auto-updates-disable
health-control auto-updates-disable --json

auto-updates-status

Check automatic updates status

Usage:

health-control auto-updates-status [OPTIONS]

Examples:

health-control auto-updates-status
health-control auto-updates-status --json

system-maintenance-enable

Enable system maintenance settings

Usage:

health-control system-maintenance-enable [OPTIONS]

Examples:

health-control system-maintenance-enable
health-control system-maintenance-enable --json

system-maintenance-disable

Disable system maintenance settings

Usage:

health-control system-maintenance-disable [OPTIONS]

Examples:

health-control system-maintenance-disable
health-control system-maintenance-disable --json

system-maintenance-status

Check system maintenance status

Usage:

health-control system-maintenance-status [OPTIONS]

Examples:

health-control system-maintenance-status
health-control system-maintenance-status --json

password-policy-enable

Enable password policy enforcement

Usage:

health-control password-policy-enable [OPTIONS]

Examples:

health-control password-policy-enable
health-control password-policy-enable --json

password-policy-disable

Disable password policy enforcement

Usage:

health-control password-policy-disable [OPTIONS]

Examples:

health-control password-policy-disable
health-control password-policy-disable --json

password-policy-status

Check password policy status

Usage:

health-control password-policy-status [OPTIONS]

Examples:

health-control password-policy-status
health-control password-policy-status --json

user-security-enable

Enable user security hardening

Usage:

health-control user-security-enable [OPTIONS]

Examples:

health-control user-security-enable
health-control user-security-enable --json

user-security-disable

Disable user security hardening

Usage:

health-control user-security-disable [OPTIONS]

Examples:

health-control user-security-disable
health-control user-security-disable --json

user-security-status

Check user security status

Usage:

health-control user-security-status [OPTIONS]

Examples:

health-control user-security-status
health-control user-security-status --json

2fa-enable

Enable two-factor authentication

Usage:

health-control 2fa-enable [OPTIONS]

Examples:

health-control 2fa-enable
health-control 2fa-enable --value $(whoami) --json

2fa-disable

Disable two-factor authentication

Usage:

health-control 2fa-disable [OPTIONS]

Examples:

health-control 2fa-disable
health-control 2fa-disable --json

2fa-status

Check two-factor authentication status

Usage:

health-control 2fa-status [OPTIONS]

Examples:

health-control 2fa-status
health-control 2fa-status --json

check-and-install

Check and install required packages

Usage:

health-control check-and-install [OPTIONS]

Examples:

health-control check-and-install tor openvpn
health-control check-and-install rkhunter chkrootkit --json

check-and-install-do

Execute installation after checking dependencies

Usage:

health-control check-and-install-do [OPTIONS]

Examples:

health-control check-and-install-do
health-control check-and-install-do --json

package-cleanup

Clean up unnecessary packages

Usage:

health-control package-cleanup [OPTIONS]

Examples:

health-control package-cleanup
health-control package-cleanup --json

clear-cache

Clear system memory caches

Usage:

health-control clear-cache [OPTIONS]

Examples:

health-control clear-cache
health-control clear-cache --level 3
health-control clear-cache --json

USB Security

usb-guard-enable

Enable USB Guard protection

Usage:

health-control usb-guard-enable [OPTIONS]

Examples:

health-control usb-guard-enable
health-control usb-guard-enable --json

usb-guard-disable

Disable USB Guard protection

Usage:

health-control usb-guard-disable [OPTIONS]

Examples:

health-control usb-guard-disable
health-control usb-guard-disable --json

usb-policy

Manage USB device policies

Usage:

health-control usb-policy [OPTIONS]

Examples:

health-control usb-policy --action list
health-control usb-policy --action add --device-id 1234:5678 --allow
health-control usb-policy --action remove --device-id 1234:5678

usb-monitor

Monitor USB device connections in real-time

Usage:

health-control usb-monitor [OPTIONS]

Examples:

health-control usb-monitor
health-control usb-monitor --duration 300
health-control usb-monitor --alert
health-control usb-monitor --block-unauthorized --log-only
health-control usb-monitor --json

usb-history

View USB device connection history

Usage:

health-control usb-history [OPTIONS]

Examples:

health-control usb-history
health-control usb-history --days 30
health-control usb-history --device-id 1234:5678
health-control usb-history --clear --days 90
health-control usb-history --json

usb-whitelist

Manage USB device whitelist

Usage:

health-control usb-whitelist [OPTIONS]

Examples:

health-control usb-whitelist --action list
health-control usb-whitelist --action add --device-id 1234:5678
health-control usb-whitelist --action import --file whitelist.json

Examples

Network Connectivity

Test network connectivity and configuration

Test both IP and domain connectivity (DNS only)

sudo health-control net-check
Expected Output: Network connectivity status

Test IP and domain connectivity including HTTP

sudo health-control net-check --http
Expected Output: HTTP connectivity test results

Network check with JSON output for automation

sudo health-control net-check --json
Expected Output: JSON formatted network status

HTTP network check with JSON output

sudo health-control net-check --http --json
Expected Output: JSON formatted HTTP connectivity results

Check IP connectivity only, skip DNS checks

sudo health-control net-check --ip-only
Expected Output: IP connectivity test results

Check domain connectivity only, skip IP ping

sudo health-control net-check --domain-only
Expected Output: Domain connectivity test results

Use custom timeout for network checks

sudo health-control net-check --timeout 15
Expected Output: Network check with 15 second timeout

IP-only connectivity check with JSON output

sudo health-control net-check --ip-only --json
Expected Output: JSON formatted IP connectivity results

Domain-only connectivity check with custom timeout

sudo health-control net-check --domain-only --timeout 20
Expected Output: Domain connectivity test with 20 second timeout

Show IPs used for connectivity testing

sudo health-control list-ips
Expected Output: List of test IP addresses

Show domains used for connectivity testing

sudo health-control list-domains
Expected Output: List of test domain names

Internet Traffic Control

Block and unblock internet traffic

Block internet using auto-detected method (tries nftables, then iptables, then UFW, then interfaces)

sudo health-control block-internet
Expected Output: Internet blocked successfully

Note

Without --method specified, health-control automatically selects the best available method

Block using iptables firewall rules

sudo health-control block-internet --method iptables
Expected Output: Iptables rules applied successfully

Block using nftables firewall rules (preferred modern firewall)

sudo health-control block-internet --method nftables
Expected Output: Nftables rules applied successfully

Block using UFW (Uncomplicated Firewall)

sudo health-control block-internet --method firewall
Expected Output: UFW rules applied successfully

Block by disabling network interfaces

sudo health-control block-internet --method interfaces
Expected Output: Network interfaces disabled successfully

Block using ALL methods (UFW, nftables, iptables, and interfaces)

sudo health-control block-internet --method all
Expected Output: All blocking methods applied successfully

Note

Applies all available blocking methods for maximum security

Block internet but allow local network traffic

sudo health-control block-internet --allow-local
Expected Output: Internet blocked, local traffic allowed

Block internet with JSON output

sudo health-control block-internet --json
Expected Output: JSON formatted blocking status

Block internet with iptables, allow local, JSON output

sudo health-control block-internet --method iptables --allow-local --json
Expected Output: JSON formatted blocking status with details

Block using ALL methods but allow local network traffic

sudo health-control block-internet --method all --allow-local
Expected Output: All blocking methods applied, local traffic allowed

Unblock internet traffic

sudo health-control unblock-internet
Expected Output: Internet unblocked successfully

Unblock using nftables specifically

sudo health-control unblock-internet --method nftables
Expected Output: Internet unblocked using nftables

Unblock using iptables specifically

sudo health-control unblock-internet --method iptables
Expected Output: Internet unblocked using iptables

Unblock using UFW specifically

sudo health-control unblock-internet --method firewall
Expected Output: Internet unblocked using UFW

Unblock ALL methods (clears UFW, nftables, iptables, and re-enables interfaces)

sudo health-control unblock-internet --method all
Expected Output: All blocking methods cleared successfully

Note

Ensures complete restoration by clearing all possible blocks

Unblock internet with JSON output

sudo health-control unblock-internet --json
Expected Output: JSON formatted unblocking status

Check current internet blocking status

sudo health-control internet-status
Expected Output: Internet traffic status

Check if internet traffic is blocked with JSON output

sudo health-control internet-status --json
Expected Output: JSON formatted block status

Network Recovery

Diagnose and fix connectivity issues

Automatically diagnose and fix connectivity issues

sudo health-control recover-internet
Expected Output: Recovery steps performed and status

Include DNS resolution testing and fixes

sudo health-control recover-internet --check-dns
Expected Output: Recovery with DNS diagnostics

Force recovery even if connectivity appears working

sudo health-control recover-internet --force
Expected Output: Forced recovery completion status

Timezone Management

Manage system timezone settings

Sync timezone based on IP geolocation

sudo health-control sync-timezone
Expected Output: Timezone synchronized to detected location

Show current system timezone

sudo health-control show-timezone
Expected Output: Current timezone information

Set specific timezone

sudo health-control set-timezone --timezone "America/New_York"
Expected Output: Timezone set to America/New_York

List all timezone categories

health-control list-timezones
Expected Output: List of timezone categories with counts

List all available timezones

health-control list-timezones --category all
Expected Output: Complete list of timezones

List African timezones

health-control list-timezones --category africa
Expected Output: List of African timezones

List American timezones

health-control list-timezones --category americas
Expected Output: List of North and South American timezones

List Asian timezones

health-control list-timezones --category asia
Expected Output: List of Asian timezones

List European timezones

health-control list-timezones --category europe
Expected Output: List of European timezones

List Australian timezones

health-control list-timezones --category australia
Expected Output: List of Australian timezones

List Pacific timezones

health-control list-timezones --category pacific
Expected Output: List of Pacific timezones

List UTC timezones

health-control list-timezones --category utc
Expected Output: List of UTC timezones

List timezone categories in JSON format

health-control list-timezones --json
Expected Output: JSON output of timezone categories

Set a random timezone from all available

sudo health-control set-random-timezone
Expected Output: Timezone set to random value

Note

Requires sudo privileges

Set random American timezone

sudo health-control set-random-timezone --category americas
Expected Output: Timezone set to random American timezone

Note

Requires sudo privileges

Set random European timezone

sudo health-control set-random-timezone --category europe
Expected Output: Timezone set to random European timezone

Note

Requires sudo privileges

Set random Asian timezone

sudo health-control set-random-timezone --category asia
Expected Output: Timezone set to random Asian timezone

Note

Requires sudo privileges

Set random African timezone

sudo health-control set-random-timezone --category africa
Expected Output: Timezone set to random African timezone

Note

Requires sudo privileges

Set random Pacific timezone with JSON output

sudo health-control set-random-timezone --category pacific --json
Expected Output: JSON output of timezone change

Note

Requires sudo privileges

MAC Address Management

Change and manage MAC addresses

Change MAC addresses for all interfaces

sudo health-control mac-change-all
Expected Output: All MAC addresses changed

Force change MAC addresses

sudo health-control mac-force-change
Expected Output: MAC addresses force-changed

Note

Use when regular change fails

Change MAC for specific interface

sudo health-control mac-change-specific --interface eth0
Expected Output: MAC address changed for eth0

Show all network interfaces

sudo health-control mac-show-interfaces
Expected Output: List of network interfaces

Show current MAC addresses

sudo health-control mac-show-macs
Expected Output: List of interfaces and MAC addresses

Reset all MACs to original values

sudo health-control mac-reset-all
Expected Output: MAC addresses reset to original

Show active network interface

sudo health-control mac-active-interface
Expected Output: Currently active network interface

Hostname Management

Get and set system hostname

Get current system hostname

sudo health-control get-hostname
Expected Output: Current hostname

Get hostname in JSON format

sudo health-control get-hostname --json
Expected Output: JSON formatted hostname

Get the actual logged-in user (handles sudo correctly)

health-control get-logged-user
Expected Output: Username of logged-in user

Note

Returns actual user even when run with sudo

Get logged user with additional info in JSON format

sudo health-control get-logged-user --json
Expected Output: JSON with username, home directory, and detection method

Set default system hostname

sudo health-control set-default-hostname
Expected Output: Default hostname set

Set random hostname for privacy

sudo health-control set-random-hostname
Expected Output: Random hostname set

Set random hostname with JSON output

sudo health-control set-random-hostname --json
Expected Output: JSON formatted hostname change result

Set custom hostname

sudo health-control set-custom-hostname --name MyHost
Expected Output: Hostname set to MyHost

Set descriptive custom hostname

sudo health-control set-custom-hostname --name privacy-machine
Expected Output: Hostname set to privacy-machine

Set custom hostname with JSON output

sudo health-control set-custom-hostname --name secure-workstation --json
Expected Output: JSON formatted hostname change result

List all hostname categories

health-control list-hostnames
Expected Output: List of available hostname categories with counts

List all available hostnames

health-control list-hostnames --category all
Expected Output: Complete list of all predefined hostnames

List Windows hostnames

health-control list-hostnames --category windows
Expected Output: List of Windows-style hostnames

List Linux hostnames

health-control list-hostnames --category linux
Expected Output: List of Linux distribution hostnames

List Apple/Mac hostnames

health-control list-hostnames --category apple
Expected Output: List of macOS and Apple device hostnames

List hostname categories in JSON format

health-control list-hostnames --json
Expected Output: JSON formatted category list with counts

Set random hostname from all categories

sudo health-control set-random-hostname-category
Expected Output: Random hostname selected and set

Set random Windows hostname

sudo health-control set-random-hostname-category --category windows
Expected Output: Random Windows-style hostname set

Set random Linux hostname

sudo health-control set-random-hostname-category --category linux
Expected Output: Random Linux distribution hostname set

Set random fictional hostname with JSON output

sudo health-control set-random-hostname-category --category fiction --json
Expected Output: Random fictional hostname set with JSON result

Offline Actions

Manage system services and hardware devices

Enable Bluetooth service

sudo health-control offline-bluetooth --action enable
Expected Output: Bluetooth enabled successfully

Disable Bluetooth service

sudo health-control offline-bluetooth --action disable
Expected Output: Bluetooth disabled successfully

Enable WiFi service

sudo health-control offline-wifi --action enable
Expected Output: WiFi enabled successfully

Disable WiFi with persistent blacklisting

sudo health-control offline-wifi --action disable
Expected Output: WiFi disabled and blacklisted

Enable USB storage devices

sudo health-control offline-usb-storage --action enable
Expected Output: USB storage access enabled

Disable USB storage devices

sudo health-control offline-usb-storage --action disable
Expected Output: USB storage access blocked

Check USB storage status with JSON output

sudo health-control offline-usb-storage --action check --json
Expected Output: JSON formatted USB storage status

Enable webcam devices

sudo health-control offline-webcam --action enable
Expected Output: Webcam access enabled

Disable webcam devices

sudo health-control offline-webcam --action disable
Expected Output: Webcam access disabled

Check webcam status

sudo health-control offline-webcam --action check
Expected Output: Webcam device status

Enable microphone devices

sudo health-control offline-microphone --action enable
Expected Output: Microphone access enabled

Disable microphone devices

sudo health-control offline-microphone --action disable
Expected Output: Microphone access disabled

Check microphone status

sudo health-control offline-microphone --action check
Expected Output: Microphone device status

Enable automatic screen lock

sudo health-control offline-screen-lock --action enable
Expected Output: Screen lock enabled

Check screen lock status with JSON output

sudo health-control offline-screen-lock --action check --json
Expected Output: JSON formatted screen lock status

Disable system logging

sudo health-control offline-systemlogs --action disable
Expected Output: System logging disabled

Disable CUPS printing service

sudo health-control offline-cups --action disable
Expected Output: CUPS printing disabled

Disable NetworkManager

sudo health-control offline-networkmanager --action disable
Expected Output: NetworkManager disabled

Enable NumLock on boot

sudo health-control offline-numlock --action enable
Expected Output: NumLock enabled on boot

Disable command history logging

sudo health-control offline-cmdhistory --action disable
Expected Output: Command history disabled

Disable automatic login

sudo health-control offline-autologin --action disable
Expected Output: Automatic login disabled

Set file descriptor limits

sudo health-control offline-fdlimit --action enable --soft-limit 1024 --hard-limit 4096
Expected Output: File descriptor limit set

Enable network optimizations

sudo health-control offline-netoptimize --action enable
Expected Output: Network optimizations enabled

Check network optimization status

sudo health-control offline-netoptimize --action check
Expected Output: Network optimization status

Check network optimization status with JSON output

sudo health-control offline-netoptimize --action check --json
Expected Output: JSON formatted network optimization status

Enable BBR congestion control

sudo health-control offline-bbr --action enable
Expected Output: BBR congestion control enabled

Check BBR congestion control status

sudo health-control offline-bbr --action check
Expected Output: BBR status information

Configure interface speed

sudo health-control offline-ifspeed --action enable --interface eth0 --speed 1000
Expected Output: Interface speed configured

Enable interface speed optimization

sudo health-control offline-ifspeed --action enable
Expected Output: Interface speed optimization enabled

Disable interface speed optimization

sudo health-control offline-ifspeed --action disable
Expected Output: Interface speed optimization disabled

Check interface speed configuration

sudo health-control offline-ifspeed --action check
Expected Output: Interface speed status

Disable Avahi service discovery

sudo health-control offline-avahi --action disable
Expected Output: Avahi service disabled

Note

Supported services: offline-avahi, offline-modem-manager, offline-ssh, offline-apache, offline-nginx, offline-docker, offline-mysql, offline-postgresql

Disable ModemManager service

sudo health-control offline-modem-manager --action disable
Expected Output: ModemManager disabled

Enable SSH service

sudo health-control offline-ssh --action enable
Expected Output: SSH service enabled

Disable Apache web server

sudo health-control offline-apache --action disable
Expected Output: Apache web server disabled

Disable Nginx web server

sudo health-control offline-nginx --action disable
Expected Output: Nginx web server disabled

Disable Docker service

sudo health-control offline-docker --action disable
Expected Output: Docker service disabled

Disable MySQL database service

sudo health-control offline-mysql --action disable
Expected Output: MySQL service disabled

Disable PostgreSQL database service

sudo health-control offline-postgresql --action disable
Expected Output: PostgreSQL service disabled

System Information

Display system and hardware information

Display comprehensive system information

sudo health-control offline-info-system
Expected Output: System details and configuration

Display hardware information in JSON

sudo health-control offline-info-hardware --json
Expected Output: JSON formatted hardware details

Display network configuration

sudo health-control offline-info-network
Expected Output: Network interfaces and settings

Display all system information

sudo health-control offline-info-all
Expected Output: Complete system information

Display process information

sudo health-control offline-info-process
Expected Output: Running processes and resource usage

Display security configuration in JSON

sudo health-control offline-info-security --json
Expected Output: Security settings and status in JSON format

Display user information

sudo health-control offline-info-user
Expected Output: User accounts and permissions

Display storage information

sudo health-control offline-info-storage
Expected Output: Disk usage and filesystem details

Display services information in JSON

sudo health-control offline-info-services --json
Expected Output: System services status in JSON format

Security Hardening

Apply and verify comprehensive security settings (7 modules: kernel, process, filesystem, network, memory, monitoring, sandboxing)

Apply standard security hardening (network-safe): kernel hardening, process isolation, filesystem security, memory protection, monitoring, sandboxing - PRESERVES internet connectivity

sudo health-control security-harden
Expected Output: Security hardening completed (network connectivity preserved)

Note

Standard profile maintains system usability and network connectivity

Apply PARANOID profile - WARNING: WILL BREAK INTERNET CONNECTIVITY: All hardening PLUS network isolation, DNS blocking, disabled IP forwarding

sudo health-control security-harden --profile paranoid
Expected Output: Paranoid security applied (network isolated)

Note

⚠️ INTERNET CONNECTIVITY DISABLED - To recover: sudo health-control recover-internet

Check if all 7 security modules are enabled and properly configured

sudo health-control security-verify
Expected Output: Shows each module: ENABLED/DISABLED and configuration status

Note

Use after security-harden to verify settings are applied

Apply only specific modules (kernel sysctl and network firewall)

sudo health-control security-harden --modules kernel,network
Expected Output: Applied 2 modules: kernel and network hardening

Note

Modules: kernel, process, filesystem, network, memory, monitoring, sandboxing

Get detailed security score and module status in JSON

sudo health-control security-score --json
Expected Output: Full JSON with category breakdowns (Core/Network/Hardening/Device/Advanced), individual check scores, and specific remediation commands

Temporarily revert security hardening (keeps framework ready for quick re-hardening)

sudo health-control security-recover
Expected Output: Security recovery completed - modules show 'ENABLED (needs configuration)'

Note

Use for troubleshooting. Framework remains enabled for easy re-hardening with security-harden.

Recover only specific security modules

sudo health-control security-recover --modules network,kernel
Expected Output: Selected modules recovered

Note

Available modules: kernel, filesystem, network, memory, monitoring, smt

Completely disable all security modules and framework (permanent removal)

sudo health-control security-reset
Expected Output: All modules show 'DISABLED' - framework completely removed

Note

WARNING: Unlike security-recover, this permanently disables the framework. Requires rebuilding to re-enable.

Reset security framework without confirmation prompt

sudo health-control security-reset --force
Expected Output: Security framework completely disabled

Note

Use --force to skip the confirmation prompt in automation scripts

Enable system security monitoring (auditd, LKRG, file integrity, auth events)

sudo health-control monitoring-enable
Expected Output: Security monitoring enabled

Disable system security monitoring services

sudo health-control monitoring-disable
Expected Output: Security monitoring disabled

Enable Tirdad kernel module for TCP ISN randomization (prevents OS fingerprinting)

sudo health-control tirdad-enable
Expected Output: Tirdad enabled successfully

Disable Tirdad TCP ISN randomization module

sudo health-control tirdad-disable
Expected Output: Tirdad disabled successfully

Check Tirdad TCP ISN randomization module status

sudo health-control tirdad-status
Expected Output: Tirdad status: ENABLED/DISABLED

Enable RAM wiping on shutdown

sudo health-control ram-wipe-enable
Expected Output: RAM wiping enabled

Disable RAM wiping

sudo health-control ram-wipe-disable
Expected Output: RAM wiping disabled

Check RAM wipe configuration and status

sudo health-control ram-wipe-status
Expected Output: RAM wipe status with memory info and auto-wipe settings

Check disk encryption status

sudo health-control disk-encryption-status
Expected Output: Disk encryption configuration

Enable swap space

sudo health-control swap-enable
Expected Output: Swap space enabled

Disable swap space

sudo health-control swap-disable
Expected Output: Swap space disabled

Encrypt swap space

sudo health-control swap-encrypt
Expected Output: Swap space encrypted

Check swap status and configuration

sudo health-control swap-status
Expected Output: Displays swap devices, size, usage, and encryption status

Decrypt encrypted swap space

sudo health-control swap-decrypt
Expected Output: Swap space decrypted

Note

Use with caution - decrypting swap reduces security

Check swap encryption status

sudo health-control swap-encrypt-status
Expected Output: Shows whether swap is encrypted and encryption details

List all USB devices

sudo health-control usb-list
Expected Output: Connected USB devices

Check LUKS nuke password status

sudo health-control luks-nuke --action status
Expected Output: LUKS nuke password configuration

Configure LUKS nuke password

sudo health-control luks-nuke --action configure --device /dev/sda5
Expected Output: LUKS nuke password configured

Note

Interactive password setup

Create system persistence

sudo health-control create-persistence
Expected Output: System persistence created

Show overall encryption status

sudo health-control encryption-status
Expected Output: System encryption status report

System Health Checks

Monitor and check system health

Perform comprehensive system security audit

sudo health-control system-audit
Expected Output: System audit status report

Scan system for rootkits

sudo health-control rootkit-scan
Expected Output: Rootkit scan results

Check system security status

sudo health-control security-status --json
Expected Output: JSON formatted security status info

IPv6 Management

Control and monitor IPv6 protocol settings

Check current IPv6 configuration status

sudo health-control ipv6-status
Expected Output: IPv6 Status: ENABLED/DISABLED with interface details

Note

Shows runtime status, boot config, and active interfaces

Disable IPv6 system-wide (sysctl and GRUB)

sudo health-control ipv6-disable
Expected Output: IPv6 disabled with details of changes applied

Note

Reboot recommended for full effect

Enable IPv6 system-wide

sudo health-control ipv6-enable
Expected Output: IPv6 enabled with details of changes applied

Note

Reboot recommended for full effect

Get detailed IPv6 status in JSON format

sudo health-control ipv6-status --json
Expected Output: Complete IPv6 configuration including runtime, boot config, and interfaces

Security Tools Integration

Advanced security tool integrations

Run comprehensive Lynis security audit

sudo health-control lynis-audit
Expected Output: Complete Lynis audit report

Note

Comprehensive security assessment

Check Lynis installation and status

sudo health-control lynis-status
Expected Output: Lynis service status

Scan system for rootkits

sudo health-control rootkit-scan
Expected Output: Rootkit scan results

Initialize AIDE database

sudo health-control aide-init
Expected Output: AIDE database created successfully

Note

First time setup required

Check file integrity with AIDE

sudo health-control aide-check
Expected Output: File integrity check results

Check kloak keystroke anonymization status

sudo health-control kloak-status
Expected Output: Kloak service status and configuration

Enable kloak keystroke anonymization

sudo health-control kloak-enable
Expected Output: Kloak enabled successfully

Disable kloak keystroke anonymization

sudo health-control kloak-disable
Expected Output: Kloak disabled successfully

Configure kloak with 200ms delay

sudo health-control kloak-configure --delay 200
Expected Output: Kloak configured with custom delay

Set kloak event mode to no-delay

sudo health-control kloak-event-mode --mode no-delay
Expected Output: Kloak event mode set

Show kloak statistics and performance

sudo health-control kloak-stats
Expected Output: Kloak performance statistics

Update AIDE database

sudo health-control aide-update
Expected Output: AIDE database updated

Scan specific directory with AIDE

sudo health-control aide-scan-dir /etc
Expected Output: Directory scan results

Reinitialize AIDE database

sudo health-control aide-reinit
Expected Output: AIDE database reinitialized

Note

Recreates database from scratch

Enhanced rootkit scanning with deep analysis

sudo health-control rootkit-scan-enhanced
Expected Output: Enhanced rootkit scan results

Note

More thorough than basic rootkit scan

Enable cold boot attack defense

sudo health-control coldboot-defense-enable
Expected Output: Cold boot defense enabled

Memory and Storage Security

Advanced memory management and storage security

Show current memory statistics

sudo health-control memory-stats
Expected Output: Memory usage and performance metrics

List all LUKS devices

sudo health-control luks-nuke --action status
Expected Output: LUKS device status and configuration

Configure nuke password interactively

sudo health-control luks-nuke --action configure --device /dev/sda5
Expected Output: LUKS nuke password configured

Note

Interactive password setup

USB and Device Security

USB device control and security policies

Allow specific USB device

sudo health-control usb-policy --action add --device-id 1234:5678 --allow
Expected Output: USB device added to allow policy

Note

Use lsusb to find device IDs

List all USB policies

sudo health-control usb-policy --action list
Expected Output: Current USB device policies

Start USB monitoring

sudo health-control usb-monitor
Expected Output: USB monitoring service started

View USB device history for last 7 days

sudo health-control usb-history --days 7
Expected Output: USB device connection history

Data Destruction

Secure data wiping procedures

Securely wipe file with 7 passes

sudo health-control wipe-file --file /path/to/file --passes 7
Expected Output: File securely wiped and unrecoverable

Note

Multiple passes increase security

Securely wipe entire directory

sudo health-control wipe-directory --path /path/to/directory --passes 3
Expected Output: Directory and contents wiped securely

Note

All files in directory will be destroyed

Wipe free space on device

sudo health-control wipe-free-space --device /dev/sda1
Expected Output: Free space wiped securely

Note

Prevents recovery of deleted files

Wipe system and application logs

sudo health-control wipe-logs
Expected Output: Logs wiped successfully

Note

Removes log file traces

Wipe browser history and data

sudo health-control wipe-browser-data
Expected Output: Browser data wiped

Note

Removes browsing history and cache

Schedule automatic file wiping with cron pattern

sudo health-control wipe-schedule --value add --value2 /path/to/file --value3 "0 0 * * *"
Expected Output: File wipe scheduled successfully

Note

Uses cron syntax for scheduling

Use DoD 5220.22-M wiping pattern

sudo health-control wipe-pattern --value dod
Expected Output: DoD wiping pattern applied

Note

Department of Defense secure wiping standard

Verify file has been securely wiped

sudo health-control wipe-verify --value /path/to/file
Expected Output: File wipe verification results

Batch wipe multiple files with 7 passes

sudo health-control wipe-batch --value "/path1,/path2,/path3" --number 7
Expected Output: Batch file wiping completed

Note

Comma-separated file paths

System Maintenance and Updates

Automated updates, password policies, and system maintenance

Enable automatic security updates

sudo health-control auto-updates-enable
Expected Output: Automatic security updates enabled

Disable automatic updates

sudo health-control auto-updates-disable
Expected Output: Automatic updates disabled

Check automatic updates status

sudo health-control auto-updates-status
Expected Output: Auto-updates configuration status

Enable strong password policy

sudo health-control password-policy-enable
Expected Output: Strong password policy enforced

Disable strong password policy

sudo health-control password-policy-disable
Expected Output: Password policy disabled

Enable user security checks

sudo health-control user-security-enable
Expected Output: User security policies enabled

Enable 2FA for specific user

sudo health-control 2fa-enable --value username
Expected Output: Two-factor authentication enabled

Disable 2FA for user

sudo health-control 2fa-disable --user username
Expected Output: Two-factor authentication disabled

Enable automatic system maintenance

sudo health-control system-maintenance-enable
Expected Output: System maintenance automation enabled

Clean up unnecessary packages

sudo health-control package-cleanup
Expected Output: System packages cleaned and optimized

Check password policy status

sudo health-control password-policy-status
Expected Output: Current password policy configuration

Disable user security checks

sudo health-control user-security-disable
Expected Output: User security policies disabled

Check user security status

sudo health-control user-security-status
Expected Output: User security configuration status

Check 2FA status for users

sudo health-control 2fa-status
Expected Output: Two-factor authentication status

Disable automatic system maintenance

sudo health-control system-maintenance-disable
Expected Output: System maintenance automation disabled

Check system maintenance status

sudo health-control system-maintenance-status
Expected Output: System maintenance configuration status

Troubleshooting

Debug and resolve common issues

Network check with extended timeout for slow connections

sudo health-control net-check --timeout 60
Expected Output: Extended connectivity test results

Note

Use when experiencing network timeouts

Enable debug logging for network diagnostics

RUST_LOG=debug sudo health-control net-check
Expected Output: Detailed debug information

Note

Use when troubleshooting connectivity issues

Extract only error information from system audit

sudo health-control system-audit --json | jq '.data.errors'
Expected Output: JSON array of system errors

Note

Requires jq for JSON parsing

Simple check with conditional message

sudo health-control internet-status && echo 'Internet OK' || echo 'Internet blocked'
Expected Output: Status message based on internet state

Extract threat count from rootkit scan

sudo health-control rootkit-scan --json | grep -o '"threats_found":[0-9]*'
Expected Output: Number of threats found

Note

Use for automated security monitoring

Run Lynis scan with system timeout

timeout 30 sudo health-control lynis-audit --value quick
Expected Output: Quick audit results or timeout

Note

Prevents hanging on system issues

Capture verbose memory diagnostics to file

sudo health-control --verbose memory-stats 2>&1 | tee /tmp/memory-debug.log
Expected Output: Memory statistics saved to log file

Note

Use for detailed memory troubleshooting

List all security status categories

sudo health-control security-status all --json | jq -r '.data | keys[]'
Expected Output: Available security check categories

Note

Use to discover available security checks

System Control

System configuration and control operations

Display current system timezone

sudo health-control show-timezone
Expected Output: Current timezone information

Sync timezone based on IP geolocation

sudo health-control sync-timezone
Expected Output: Timezone synchronized to detected location

Show timezone based on current IP location

sudo health-control show-remote-timezone
Expected Output: Remote location timezone information

Set specific timezone

sudo health-control set-timezone --timezone "America/New_York"
Expected Output: Timezone set to America/New_York

Play system alert sound

sudo health-control play-sound --sound alert
Expected Output: Sound played successfully

Play success notification sound

sudo health-control play-sound success
Expected Output: Success sound played

Play warning sound in MP3 format

sudo health-control play-sound warning -m mp3
Expected Output: Warning sound played in MP3

Play alert sound with debug output

sudo health-control play-sound alert --debug
Expected Output: Alert sound played with debug info

Send system notification

sudo health-control notify --message "Security check complete"
Expected Output: Notification sent successfully

Send basic notification message

sudo health-control notify --message "Hello from Kodachi"
Expected Output: Notification sent successfully

Send notification with message body

sudo health-control notify --message "Alert" --body "VPN connected"
Expected Output: Detailed notification sent

Send critical notification with 30 second duration

sudo health-control notify --message "Warning" --urgency critical --duration 30
Expected Output: Critical notification sent

Send notification with custom icon

sudo health-control notify --message "Update" --notify-icon "/path/to/icon.png"
Expected Output: Notification with icon sent

Memory and Performance Management

Memory management, cleanup, and performance optimization

Show current memory statistics

sudo health-control memory-stats
Expected Output: Memory usage and performance metrics

Show memory statistics in JSON format

sudo health-control memory-stats --json
Expected Output: JSON formatted memory statistics

Clean system memory

sudo health-control memory-clean
Expected Output: Memory cleaned successfully

Force memory cleanup

sudo health-control memory-force-clean
Expected Output: Memory force-cleaned successfully

Note

Use when regular cleanup insufficient

Securely wipe memory

sudo health-control memory-wipe
Expected Output: Memory wiped securely

Note

Security-focused memory clearing

Wipe specific process memory securely

sudo health-control memory-wipe-process --value firefox
Expected Output: Firefox process memory wiped successfully

Note

Clears sensitive data from process memory

Wipe Chrome browser memory

sudo health-control memory-wipe-process --value chrome
Expected Output: Chrome process memory wiped successfully

Note

Removes cached passwords and session data

Set swappiness=10, cache_pressure=100

sudo health-control swap-configure --swappiness 10 --cache-pressure 100
Expected Output: Swap parameters configured: swappiness=10, cache_pressure=100

Note

Low swappiness reduces swap usage, improves performance

Limit Firefox to 2GB RAM

sudo health-control memory-limits --value firefox --limit 2048
Expected Output: Memory limit set for Firefox: 2048 MB

Note

Prevents single process from consuming excessive memory

Limit Chrome to 1GB RAM

sudo health-control memory-limits --value chrome --limit 1024
Expected Output: Memory limit set for Chrome: 1024 MB

Emergency Operations - Kill Switch & Panic Modes

Emergency security measures with two modes: MONITORING (arm/disarm) prepares for threats, IMMEDIATE (panic/activate) executes emergency procedures

ARM kill switch monitoring (preparation mode)

sudo health-control kill-switch-arm
Expected Output: Kill switch ARMED - Monitoring mode active

Note

MONITORING MODE: Watches for security triggers (network intrusions, tampering). Does NOT take action until triggered. Auto-activates panic on detection.

DISARM kill switch monitoring

sudo health-control kill-switch-disarm
Expected Output: Kill switch DISARMED

Note

Stops monitoring mode. Use after threat has passed or false alarm.

Check if monitoring is armed/disarmed

sudo health-control kill-switch-status
Expected Output: Shows armed status, trigger count, armed time

Note

READ-ONLY: Just displays current state, takes no action

IMMEDIATELY activate kill switch (default: medium panic)

sudo health-control kill-switch-activate
Expected Output: KILL SWITCH ACTIVATED - emergency procedures executed

Note

IMMEDIATE ACTION: Unlike 'arm', this executes panic NOW. Prompts for confirmation. Use --level soft/medium/hard

IMMEDIATE soft panic (NO confirmation)

sudo health-control panic-soft
Expected Output: Network killed, clipboard cleared, screen locked

Note

INSTANT: Kill network + clear clipboard + lock screen. Reversible. Good for quick privacy.

IMMEDIATE medium panic (requires confirmation)

sudo health-control panic-medium
Expected Output: Panic mode activated after confirmation

Note

WITH CONFIRMATION: Soft + kill processes + clear memory + unmount devices. Requires restart to restore.

IMMEDIATE hard panic (double confirmation)

sudo health-control panic-hard
Expected Output: System shutdown initiated

Note

CRITICAL - DOUBLE CONFIRM: Medium + RAM wipe + shutdown in 1 min. IRREVERSIBLE! System WILL shutdown!

Create recovery checkpoint BEFORE panic

sudo health-control create-recovery-point
Expected Output: Recovery point created

Note

Create BEFORE activating panic modes. Allows restoration of configs after emergency.

Restore system after panic activation

sudo health-control panic-recover
Expected Output: System recovered from panic mode

Note

Use AFTER panic to restore normal operation. Restarts services, fixes permissions.

Set panic profile to paranoid mode

sudo health-control panic-profile --value paranoid
Expected Output: Panic profile set to paranoid

Note

Maximum security response level

Kill specific network interface

sudo health-control kill-network-interface --value eth0
Expected Output: Network interface eth0 terminated

Note

Selective network isolation

Terminate specific process immediately

sudo health-control kill-process --value firefox
Expected Output: Process firefox terminated

Note

Emergency process termination

Recover from panic mode using recovery point

sudo health-control panic-recover
Expected Output: System recovered from panic mode

Note

Restores system to pre-panic state

Security

General security status and monitoring

Show comprehensive security status

sudo health-control security-status
Expected Output: Complete security status report

Show security status in JSON format

sudo health-control security-status --json
Expected Output: JSON formatted security status

USB Security

USB device control and monitoring

Enable USB Guard protection

sudo health-control usb-guard-enable
Expected Output: USB Guard enabled successfully

Disable USB Guard protection

sudo health-control usb-guard-disable
Expected Output: USB Guard disabled successfully

Add USB device to allow policy

sudo health-control usb-policy --action add --device-id 1234:5678 --allow
Expected Output: USB device policy added

Note

Use lsusb to find device IDs

List all USB policies

sudo health-control usb-policy --action list
Expected Output: Current USB device policies

Start USB device monitoring

sudo health-control usb-monitor
Expected Output: USB monitoring started

View USB device history for last 7 days

sudo health-control usb-history --days 7
Expected Output: USB device connection history

Storage Security

Storage encryption and secure wiping

Encrypt storage device

sudo health-control storage-encrypt --device /dev/sdb1
Expected Output: Storage device encrypted successfully

Note

Backup data before encryption

Securely wipe storage device

sudo health-control storage-wipe --device /dev/sdb1 --passes 3
Expected Output: Storage device wiped securely

Note

Data will be permanently destroyed

Security Assessment

Security scoring and reporting

Calculate overall security score

sudo health-control security-score
Expected Output: Shows score (0-100), security level (Critical/Poor/Fair/Good/Excellent), and actionable fixes

Get security score in JSON format

sudo health-control security-score --json
Expected Output: Full JSON with category breakdowns (Core/Network/Hardening/Device/Advanced), individual check scores, and specific remediation commands

Generate comprehensive security report

sudo health-control security-report
Expected Output: Detailed security assessment report

Generate security report in JSON format

sudo health-control security-report --json
Expected Output: JSON formatted security report

View security score history for last 30 days

sudo health-control security-history --days 30
Expected Output: Security score trends and historical data

Note

Shows security improvements over time

View last 7 days security history in JSON

sudo health-control security-history --days 7 --json
Expected Output: JSON formatted security history

Review security fixes before applying

sudo health-control security-remediate
Expected Output: Security fix recommendations displayed

Note

Manual review mode for security fixes

Package Management

Automated package installation and management

Check for and install required packages

sudo health-control check-and-install
Expected Output: Package installation completed

Note

Installs missing system dependencies

Execute package installation with confirmation

sudo health-control check-and-install-do
Expected Output: Package installation executed

Note

Interactive installation process

Hardware Security

Hardware-level security features

Verify hardware random number generator

sudo health-control hardware-rng-verify
Expected Output: Hardware RNG status and quality

Check system entropy status

sudo health-control entropy-status
Expected Output: Entropy pool status and quality

Enable cold boot attack defense

sudo health-control coldboot-defense-enable
Expected Output: Cold boot defense enabled

Check boot integrity

sudo health-control boot-integrity-check
Expected Output: Boot integrity verification results

System Information Extended

Detailed system information and diagnostics

Display comprehensive system information

sudo health-control offline-info-system
Expected Output: Complete system details and configuration

Display hardware information

sudo health-control offline-info-hardware
Expected Output: Hardware components and specifications

Display hardware information in JSON

sudo health-control offline-info-hardware --json
Expected Output: JSON formatted hardware details

Display process information

sudo health-control offline-info-process
Expected Output: Running processes and resource usage

Display security configuration

sudo health-control offline-info-security
Expected Output: Security settings and status

Display network configuration

sudo health-control offline-info-network
Expected Output: Network interfaces and settings

Display user information

sudo health-control offline-info-user
Expected Output: User accounts and permissions

Display storage information

sudo health-control offline-info-storage
Expected Output: Disk usage and filesystem details

Display services information

sudo health-control offline-info-services
Expected Output: System services status

Display all system information

sudo health-control offline-info-all
Expected Output: Complete system information report

Environment Variables

Variable Description Default Values
RUST_LOG Set logging level info error
NO_COLOR Disable all colored output when set unset 1

Exit Codes

Code Description
0 Success
1 General error
2 Invalid arguments
3 Permission denied
4 Network error
5 File not found

Back to top