hardenedlinux / hardenedlinux_profilesLinks
It contains hardenedlinux community documentation.
☆60Updated last year
Alternatives and similar repositories for hardenedlinux_profiles
Users that are interested in hardenedlinux_profiles are comparing it to the libraries listed below
Sorting:
- Some scripts to create a reproducible build for grsecurity☆30Updated 7 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- My presentations and papers☆46Updated 4 years ago
- hardenedlinux.org website☆32Updated 3 weeks ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- ☆29Updated 6 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 8 years ago
- Security Technical Implementation Guide for Debian☆151Updated 2 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- ☆30Updated 10 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- ☆17Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆44Updated 2 weeks ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Hardened PoC: PaX for Android☆39Updated 3 years ago
- ☆38Updated 9 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Web of trust grapher☆38Updated last week
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- ☆36Updated 12 years ago
- JEFF file format tools☆27Updated 9 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago