Debian GNU/Linux based Services Profiles
☆247Mar 27, 2022Updated 4 years ago
Alternatives and similar repositories for Debian-GNU-Linux-Profiles
Users that are interested in Debian-GNU-Linux-Profiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Technical Implementation Guide for Debian☆153Apr 7, 2023Updated 3 years ago
- ☆377Oct 30, 2025Updated 6 months ago
- Some scripts to create a reproducible build for grsecurity☆31Sep 19, 2017Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Sep 19, 2023Updated 2 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Jul 7, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hardened Debian GNU/Linux distro auditing☆464Apr 13, 2026Updated last month
- Harbian distribution build documents.☆14Sep 1, 2020Updated 5 years ago
- Hardened PoC: PaX for Android☆39Jun 20, 2021Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆192Jul 31, 2025Updated 9 months ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆35Jun 4, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Scripts to show tool impact on recent linux kernel development☆13Dec 17, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- My proof-of-concept exploits for the Linux kernel☆1,575Sep 11, 2025Updated 8 months ago
- a series tutorial for linux exploit development to newbie.☆572Apr 12, 2024Updated 2 years ago
- ☆21Nov 13, 2021Updated 4 years ago
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- KernelMemorySanitizer, a detector of uses of uninitialized memory in the Linux kernel☆418Mar 5, 2026Updated 2 months ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- ☆39Dec 4, 2023Updated 2 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Nov 14, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- A Kernel fuzzer focusing on race bugs☆378Jul 10, 2019Updated 6 years ago
- ☆45Aug 21, 2018Updated 7 years ago
- Vault Exploit Defense☆128Sep 7, 2024Updated last year
- ☆31Apr 20, 2016Updated 10 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ☆16Dec 15, 2025Updated 5 months ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,181Updated this week
- ☆73Dec 5, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆72Jun 7, 2019Updated 6 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆27Sep 10, 2025Updated 8 months ago
- ☆109May 9, 2019Updated 7 years ago
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops, workstations…☆1,559Updated this week
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago