CISOfy / lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
☆14,054Updated 2 weeks ago
Alternatives and similar repositories for lynis:
Users that are interested in lynis are comparing it to the libraries listed below
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,280Updated this week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,482Updated this week
- Nginx configuration static analyzer☆8,430Updated 8 months ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,684Updated 2 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆10,095Updated this week
- An evolving how-to guide for securing a Linux server.☆18,004Updated 5 months ago
- Open Source Vulnerability Management Platform☆5,359Updated last month
- Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems.☆28,317Updated this week
- SQL powered operating system instrumentation, monitoring, and analytics.☆22,382Updated this week
- A terminal UI for tshark, inspired by Wireshark☆9,365Updated 11 months ago
- The easiest, and most secure way to access and protect all of your infrastructure.☆18,307Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,475Updated last week
- Top-like interface for container metrics☆15,947Updated 9 months ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,084Updated 4 months ago
- Find, verify, and analyze leaked credentials☆18,736Updated this week
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,970Updated 9 months ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,611Updated 4 months ago
- Exploitation Framework for Embedded Devices☆12,460Updated 2 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,494Updated last week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆25,434Updated this week
- Infection Monkey - An open-source adversary emulation platform☆6,777Updated last month
- The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in productio…☆9,345Updated 5 months ago
- Vulnerability Static Analysis for Containers☆10,579Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,317Updated 4 months ago
- Attack Surface Management Platform☆8,639Updated last month
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆6,789Updated this week
- A pretty sweet vulnerability scanner☆4,122Updated 6 months ago
- Open-Source Phishing Toolkit☆12,459Updated 6 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆12,164Updated this week
- Malicious traffic detection system☆6,884Updated this week