hardenedlinux / security-chainLinks
This is not the cyber you ever expected....did I just say cyyyberrrr....
☆15Updated 6 years ago
Alternatives and similar repositories for security-chain
Users that are interested in security-chain are comparing it to the libraries listed below
Sorting:
- It contains hardenedlinux community documentation.☆60Updated last year
- Tear the firmware apart with your bare hands;-)☆192Updated this week
- A tool for parsing common ACPI tables☆14Updated 5 years ago
- Debian GNU/Linux based Services Profiles☆240Updated 3 years ago
- Collating patches for gpart from all distributions☆30Updated 2 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆49Updated 3 years ago
- Hardened PoC: PaX for Android☆39Updated 4 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 3 months ago
- ☆29Updated 6 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Cable modem firmware dump☆41Updated 10 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Hardware project of the Nitrokey Storage device☆39Updated last year
- USB armory - hardware control tool☆32Updated 5 months ago
- hardenedlinux.org website☆32Updated 2 months ago
- Tor traffic whitelisting gateway☆72Updated 3 months ago
- ☆45Updated 6 years ago
- External plugins for examples, experimental, and some legacy code.☆40Updated 2 weeks ago
- Hardened Memory Allocator for many Applications to increase Security. Debian packaging fork only. Fork Homepage: https://www.whonix.org/w…☆9Updated last year
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 4 years ago
- USB armory Debian base image☆81Updated 3 months ago
- Security Project☆90Updated last week
- Read-only mirror of https://chromium.googlesource.com/chromiumos/platform/vboot_reference. We don't handle pull requests.☆38Updated this week
- Reseed data management tools for I2P☆36Updated 5 months ago
- sign elf binaries with GPG☆18Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- opmsg p2p transport network☆71Updated 7 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year