fedoraredteam / elemLinks
Enterprise Linux Exploit Mapper
☆28Updated 7 years ago
Alternatives and similar repositories for elem
Users that are interested in elem are comparing it to the libraries listed below
Sorting:
- ☆26Updated last month
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- IPMI stuff from DARPA work☆74Updated 3 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Manages continuous scans of your infrastructure☆107Updated 3 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- Web of trust grapher☆38Updated 6 months ago
- ☆14Updated 7 years ago
- Certifiable Linux Integration Platform (CLIP)☆48Updated 2 years ago
- A simple, self-contained regression test suite for the Linux Kernel's audit subsystem☆24Updated 3 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Network visualizer tool built using Processing☆24Updated 4 years ago
- Puppet module for Auditd☆41Updated 4 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated last year
- A generic log anonymizer☆21Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A local scanner for vulnerable web applications☆40Updated this week
- ☆27Updated 9 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 8 years ago
- Tools for inspecting disk images☆24Updated 7 years ago
- Alert when users log in from new locations☆41Updated 8 years ago
- ip6.arpa scanner☆32Updated 8 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Updated 5 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- ☆30Updated 10 years ago
- ISC Forge is an open source DHCP conformance validation framework, primarily used for testing ISC Kea.☆37Updated last week
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆67Updated 2 weeks ago
- ☆41Updated 4 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago