a13xp0p0v / kernel-hardening-checkerLinks
A tool for checking the security hardening options of the Linux kernel
☆1,972Updated last week
Alternatives and similar repositories for kernel-hardening-checker
Users that are interested in kernel-hardening-checker are comparing it to the libraries listed below
Sorting:
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,232Updated 10 months ago
- Linux Kernel Runtime Guard☆540Updated 2 weeks ago
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆559Updated this week
- Tracking CVEs for the linux Kernel☆751Updated last year
- The SELinux Notebook☆670Updated this week
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,258Updated 2 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆828Updated 10 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,902Updated last year
- EMBA - The firmware security analyzer☆3,168Updated this week
- Fully dockerized Linux kernel debugging environment☆767Updated last year
- Checksec☆2,225Updated last month
- Platform Security Assessment Framework☆3,133Updated this week
- Credentials Dumper for Linux using eBPF☆1,147Updated last year
- The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnera…☆1,530Updated last week
- Full set of AppArmor policies☆668Updated this week
- Linux audit userspace repository☆671Updated 3 weeks ago
- Quickly build and run kernels inside a virtualized snapshot of your live system☆662Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,236Updated this week
- A collection of resources for linux reverse engineering☆2,059Updated 3 years ago
- Extract files from any kind of container formats☆2,359Updated last week
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,252Updated last year
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,587Updated 11 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,196Updated 5 months ago
- awesome-linux-rootkits☆1,954Updated 9 months ago
- Sysmon for Linux☆1,981Updated 3 months ago
- ☆641Updated 7 months ago
- Linux Kernel Hacking☆741Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,638Updated 2 years ago
- Programmable debugger☆1,930Updated last week
- Best Practice Auditd Configuration☆1,696Updated 8 months ago