stevegrubb / security-assessorLinks
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆17Updated 9 months ago
Alternatives and similar repositories for security-assessor
Users that are interested in security-assessor are comparing it to the libraries listed below
Sorting:
- Linux Application Firewall☆58Updated 5 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- ☆30Updated 10 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Indicator of Compromise Mapping Service☆12Updated 11 years ago
- Host files with DNS☆33Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A scalable framework for binary analysis in a containered environment.☆13Updated 6 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated 2 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- Install script for grsecurity for Debian environments☆60Updated 9 years ago