SELinuxProject / setoolsLinks
SELinux Policy Analysis Tools
☆180Updated 3 weeks ago
Alternatives and similar repositories for setools
Users that are interested in setools are comparing it to the libraries listed below
Sorting:
- SELinux Reference Policy v2☆331Updated 3 weeks ago
- GitHub mirror of the SELinux kernel repository☆154Updated last week
- The SELinux Notebook☆633Updated last month
- The SELinux Common Intermediate Language (CIL) is designed to be a language that sits between one or more high level policy languages (su…☆66Updated 2 years ago
- selinux-policy for Fedora is a large patch off the mainline☆179Updated this week
- Linux Kernel Runtime Guard☆455Updated last week
- Static code analysis of refpolicy style SELinux policy☆44Updated 2 months ago
- Information about Linux system calls on different architectures☆160Updated last month
- This is the upstream SELinux testsuite which is designed as a basic set of regression tests for the SELinux kernel functionality.☆55Updated last month
- A high level language for SELinux policy☆59Updated 3 months ago
- SELinux policy analysis tool☆17Updated 4 years ago
- Containers for building the Linux kernel or other software with many different compilers☆222Updated 2 months ago
- setools has moved to https://github.com/SELinuxProject/setools☆91Updated 6 years ago
- sandboxing and containment tool used in ChromeOS and Android☆311Updated last week
- Fedora SELinux Userspace☆25Updated last week
- Tools and libraries to work with EFI variables☆253Updated 9 months ago
- Linux Kernel Sanitizers, fast bug-detectors for the Linux kernel☆458Updated last month
- Check linux sources dump for known CVEs.☆132Updated last month
- Debian GNU/Linux based Services Profiles☆238Updated 3 years ago
- File Access Policy Daemon☆214Updated this week
- This is a simple how-to to create your own android kernel debugging cable using commercially available parts.☆202Updated 3 years ago
- Collection of files for booting Linux kernels☆30Updated 6 months ago
- Extended crypt library for descrypt, md5crypt, bcrypt, and others☆211Updated last month
- ☆105Updated 9 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆235Updated last year
- Upstream shadow tree☆345Updated this week
- Linux kernel source tree (Kernel Self Protection Project)☆86Updated 4 months ago
- The utility to manipulate machine owner keys☆70Updated 3 weeks ago
- BootStomp: a bootloader vulnerability finder☆401Updated 3 years ago
- Trusted Path Execution (TPE) Linux Kernel Module☆160Updated 5 years ago