stevegrubb / security-assessorLinks
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated 10 months ago
Alternatives and similar repositories for security-assessor
Users that are interested in security-assessor are comparing it to the libraries listed below
Sorting:
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Linux Application Firewall☆58Updated 5 years ago
- ☆30Updated 10 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Certifiable Linux Integration Platform (CLIP)☆47Updated 2 years ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- ☆26Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- BSM based intrusion detection system☆39Updated 5 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated 2 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆79Updated 5 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- ☆13Updated 7 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Tools for inspecting disk images☆25Updated 6 years ago