mempo / mempo-kernelLinks
Deterministic kernel build scripts, for Linux, mainly for Debian
☆47Updated 10 years ago
Alternatives and similar repositories for mempo-kernel
Users that are interested in mempo-kernel are comparing it to the libraries listed below
Sorting:
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Hardened kernel generation - Deprecated☆48Updated 8 years ago
- Password manager for USB Armory☆36Updated 10 years ago
- ☆30Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆42Updated 8 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆80Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- Web of trust grapher☆38Updated 2 months ago
- An evil teddy bear that steals your secrets☆39Updated 7 years ago
- Syscall Firewalls for VM Isolation☆11Updated 8 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- ☆17Updated 7 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- free crypto audit☆31Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- ☆15Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago