The SELinux Notebook
☆722Jan 7, 2026Updated last month
Alternatives and similar repositories for selinux-notebook
Users that are interested in selinux-notebook are comparing it to the libraries listed below
Sorting:
- SELinux Reference Policy v2☆372Updated this week
- This is the upstream repository for the Security Enhanced Linux (SELinux) userland libraries and tools. The software provided by this pro…☆1,560Feb 2, 2026Updated last month
- Static code analysis of refpolicy style SELinux policy☆49Mar 20, 2025Updated 11 months ago
- SELinux Policy Analysis Tools☆193Feb 24, 2026Updated last week
- GitHub mirror of the SELinux kernel repository☆162Feb 23, 2026Updated last week
- selinux-policy for Fedora is a large patch off the mainline☆200Updated this week
- This is the upstream SELinux testsuite which is designed as a basic set of regression tests for the SELinux kernel functionality.☆59Feb 9, 2026Updated 3 weeks ago
- This repository contains a tool for generating SELinux security profiles for containers☆568Dec 15, 2025Updated 2 months ago
- ☆25Jun 3, 2022Updated 3 years ago
- A high level language for SELinux policy☆60Jan 28, 2026Updated last month
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- A tool for checking the security hardening options of the Linux kernel☆2,041Updated this week
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Fedora Atomic images built on top of Onyx, designed for Budgie Desktop development☆11Feb 11, 2024Updated 2 years ago
- 8️⃣ systemd source-git for RHEL8☆10Jan 30, 2026Updated last month
- Quarkslab conference talks☆314Nov 7, 2025Updated 4 months ago
- ☆32Oct 13, 2025Updated 4 months ago
- A CLI to fetch the status of charging stations☆14Feb 24, 2026Updated last week
- Tool Collection for AOSP and AAOS builds☆14Apr 15, 2025Updated 10 months ago
- Linux audit userspace repository☆700Updated this week
- ☆133Jan 25, 2026Updated last month
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,258Dec 27, 2025Updated 2 months ago
- Ansible modules to manage Koji resources☆23Dec 16, 2024Updated last year
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- Linux Runtime Security and Forensics using eBPF☆4,406Updated this week
- common selinux implementation☆182Dec 12, 2025Updated 2 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆68Dec 3, 2025Updated 3 months ago
- Container network stack☆699Updated this week
- slides for conference talks☆105Jul 27, 2025Updated 7 months ago
- A simple project to enable playing with SELinux contexts and policies on a bespoke piece of code.☆44Feb 18, 2026Updated 2 weeks ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,074Updated this week
- PoC to bypass Android restrictions☆217Mar 27, 2019Updated 6 years ago
- Joern Workshops☆31Jan 16, 2025Updated last year
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆20Sep 19, 2025Updated 5 months ago
- File Access Policy Daemon☆233Feb 6, 2026Updated last month
- Prometheus exporter for BMW Connected Drive☆14Sep 25, 2020Updated 5 years ago
- ☆18Oct 18, 2019Updated 6 years ago
- RPM Packaging Guide☆276May 20, 2024Updated last year