a13xp0p0v / kernel-hardening-checkerLinks
A tool for checking the security hardening options of the Linux kernel
☆1,961Updated 2 weeks ago
Alternatives and similar repositories for kernel-hardening-checker
Users that are interested in kernel-hardening-checker are comparing it to the libraries listed below
Sorting:
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,224Updated 9 months ago
- Linux Kernel Runtime Guard☆529Updated last week
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆555Updated last week
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,585Updated 10 months ago
- Tracking CVEs for the linux Kernel☆751Updated last year
- The SELinux Notebook☆666Updated 2 months ago
- EMBA - The firmware security analyzer☆3,141Updated this week
- Best Practice Auditd Configuration☆1,696Updated 8 months ago
- A collection of resources for linux reverse engineering☆2,056Updated 3 years ago
- Linux kernel map☆1,115Updated 5 months ago
- Fully dockerized Linux kernel debugging environment☆767Updated last year
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,254Updated last month
- Checksec☆2,215Updated 3 weeks ago
- ☆639Updated 6 months ago
- Linux audit userspace repository☆675Updated 3 weeks ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆5,833Updated last week
- Quickly build and run kernels inside a virtualized snapshot of your live system☆653Updated last week
- Programmable debugger☆1,928Updated last week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,903Updated last year
- Credentials Dumper for Linux using eBPF☆1,145Updated last year
- A collection of links related to Linux kernel security and exploitation☆6,167Updated 2 weeks ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆827Updated 9 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆914Updated last year
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,897Updated last month
- Monitor Network Traffic Per Executable, Beautifully Visualized☆748Updated last year
- awesome-linux-rootkits☆1,948Updated 8 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆486Updated 2 years ago
- ☆1,502Updated 3 years ago
- SSH-MITM - ssh audits made simple☆1,409Updated last week
- Simple Linux seccomp rules without writing any code☆505Updated 3 months ago