hardenedlinux / hardenedlinux_profilesLinks
It contains hardenedlinux community documentation.
☆60Updated 2 years ago
Alternatives and similar repositories for hardenedlinux_profiles
Users that are interested in hardenedlinux_profiles are comparing it to the libraries listed below
Sorting:
- Some scripts to create a reproducible build for grsecurity☆31Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- hardenedlinux.org website☆32Updated 8 months ago
- grsecurity is the most advanced Linux kernel hardening patchset. This repository, not affiliated with the upstream project, aggregate mos…☆86Updated 8 years ago
- ☆30Updated 10 years ago
- My presentations and papers☆47Updated 5 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- Hardened kernel generation - Deprecated☆48Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆152Updated 7 years ago
- ☆25Updated 10 years ago
- Security Technical Implementation Guide for Debian☆152Updated 2 years ago
- A USB layer firewall for the Linux kernel☆36Updated 7 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html☆38Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- JEFF file format tools☆27Updated 10 years ago
- Web of trust grapher☆38Updated 6 months ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆64Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ☆29Updated 6 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago