SELinuxProject / selint
Static code analysis of refpolicy style SELinux policy
☆42Updated last week
Alternatives and similar repositories for selint:
Users that are interested in selint are comparing it to the libraries listed below
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆60Updated 2 months ago
- LKRG bypass methods☆71Updated 5 years ago
- A high level language for SELinux policy☆58Updated 3 weeks ago
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.☆89Updated 4 years ago
- Linux kernel - See Landlock issues☆37Updated 3 months ago
- unofficial grsecurity gpl release☆22Updated 6 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆117Updated last year
- Check linux sources dump for known CVEs.☆130Updated 4 months ago
- ☆15Updated 4 years ago
- eBPF - extended Berkeley Packet Filter tooling☆123Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆63Updated last month
- ☆26Updated last year
- (Linux Kernel) Stack Monitoring Tool☆44Updated 3 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆41Updated 3 months ago
- Converged Security Suite for Intel & AMD platform security features☆60Updated last month
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- Linux crash harness with runtime process instrumentation☆22Updated 4 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆15Updated 3 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- Conferences, tools, papers, etc.☆43Updated last month
- egrets monitors egress☆45Updated 4 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆72Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated last month