stevegrubb / security-assessorLinks
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated last year
Alternatives and similar repositories for security-assessor
Users that are interested in security-assessor are comparing it to the libraries listed below
Sorting:
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Linux Application Firewall☆58Updated 5 years ago
- ☆30Updated 10 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆38Updated 2 years ago
- Host files with DNS☆33Updated 9 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- A simple command-line script to interact with the virustotal-api☆62Updated 7 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- BSM based intrusion detection system☆40Updated 2 weeks ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 10 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Updated 13 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆67Updated 14 years ago
- Chef repository for pentesting tools☆13Updated 8 years ago
- Securix Main repository including installer and controll scripts☆14Updated 5 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Plugins written for CVE-Search☆27Updated 4 years ago