hardenedlinux / grsecurity-reproducible-build
Some scripts to create a reproducible build for grsecurity
☆30Updated 7 years ago
Alternatives and similar repositories for grsecurity-reproducible-build:
Users that are interested in grsecurity-reproducible-build are comparing it to the libraries listed below
- It contains hardenedlinux community documentation.☆60Updated last year
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- hardenedlinux.org website☆32Updated last year
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- ☆24Updated 9 years ago
- Hardened PoC: PaX for Android☆39Updated 3 years ago
- ☆17Updated 7 years ago
- grsecurity is the most advanced Linux kernel hardening patchset. This repository, not affiliated with the upstream project, aggregate mos…☆85Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆59Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- setroubleshootd xSports☆92Updated 7 years ago
- ☆30Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- ☆15Updated 8 years ago
- Tracking grsecurity and PaX enabled kernels...☆21Updated 7 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Hardware project of the Nitrokey Storage device☆38Updated 10 months ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- Hardened kernel generation - Deprecated☆47Updated 7 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- JEFF file format tools☆27Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago