stevegrubb / security-assessorLinks
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated last year
Alternatives and similar repositories for security-assessor
Users that are interested in security-assessor are comparing it to the libraries listed below
Sorting:
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Linux Application Firewall☆58Updated 5 years ago
- ☆30Updated 10 years ago
- Host files with DNS☆33Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- Mass DNS resolution tool☆37Updated 2 weeks ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Plugins written for CVE-Search☆27Updated 4 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- BSM based intrusion detection system☆40Updated 2 months ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆13Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆38Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 7 years ago
- IPMI stuff from DARPA work☆74Updated 3 years ago
- Enterprise Linux Exploit Mapper☆28Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago