stevegrubb / security-assessor
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated 6 months ago
Alternatives and similar repositories for security-assessor:
Users that are interested in security-assessor are comparing it to the libraries listed below
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- ☆11Updated 4 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- BSM based intrusion detection system☆39Updated 4 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Host files with DNS☆32Updated 9 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- ☆10Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Tools for inspecting disk images☆25Updated 6 years ago
- Securix Main repository including installer and controll scripts☆14Updated 4 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- ☆27Updated 8 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago