stevegrubb / security-assessorLinks
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated 9 months ago
Alternatives and similar repositories for security-assessor
Users that are interested in security-assessor are comparing it to the libraries listed below
Sorting:
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- Linux Application Firewall☆58Updated 5 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- ☆30Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Recon system hardening scanner☆46Updated 8 years ago
- ☆27Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Host files with DNS☆32Updated 9 years ago
- BSM based intrusion detection system☆39Updated 4 years ago
- Tools for inspecting disk images☆25Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Python based client for IBM XForce Exchange☆25Updated 8 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago