dolanjs / ubuntu-grsecLinks
☆30Updated 10 years ago
Alternatives and similar repositories for ubuntu-grsec
Users that are interested in ubuntu-grsec are comparing it to the libraries listed below
Sorting:
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- ☆24Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- lte security☆41Updated 9 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- ☆17Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- ☆12Updated 8 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Install script for grsecurity for Debian environments☆60Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- ☆13Updated 7 years ago
- Android wireless karma attack detector☆67Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago