Search Results for "kernel security" - Page 6

Showing 251 open source projects for "kernel security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1

    Trusted Path Execution LKM

    A Linux Kernel Module that implements Trusted Path Execution

    tpe-lkm is a Linux kernel module implementing Trusted Path Execution, a security feature that denies users from executing programs that are not owned by root, or are writable. This closes the door on a whole category of exploits where a malicious user tries to execute his or her own code to hack the system. Since the module doesn't use any kind of ACLs, it works out of the box with no configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ...v=xxVOH3mo3Gw Important Bash Update: http://sourceforge.net/projects/vectorinpup/files/Security/bash-4.1.14-2.pet/download
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Linux Exploit Suggester

    Linux Exploit Suggester

    Linux Exploit Suggester; based on operating system release number

    Linux Exploit Suggester is a lightweight Perl script designed to help security testers quickly identify local Linux kernel privilege-escalation candidates by matching the host’s kernel/OS release string against a curated list of known vulnerable versions. It runs uname -r by default (or accepts a manual -k kernel string) and prints a suggestive, human-readable list of possible exploit names, CVEs, and references that match that kernel version. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Solak K&D

    Solak K&D

    Pentest Distro - Windows 8 Themed - Hybrid Ubuntu 12.04.4lts / Kali

    !!! UPDATED 8/12/2014 !!! Solak K&D (key and dagger) Ubuntu 12.04.4 LTS w/ Kali (debian) kernel 3.7 This is a penetration testing distribution that has been heavily themed to look like Windows 8 for obvious penetration testing purposes. It relies heavily on Xfce4.10 and compiz. For now only available in 32bit (x86) To install use unetbootin or burn to dvd. Works with VMWARE Login: root / toor :: user / resu Type in terminal: Please don't install on a...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 5
    Cfg2html generates an HTML or plain ASCII report of your AIX system. It includes configuration information about kernel, filesystems, security, etc, and might be usefull for system documentation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    ESSPEE - Penetration Testing & Forensics

    ESSPEE - Penetration Testing & Forensics

    (Android Forensics & Malware Analysis Included)

    ESSPEE - Extreme Security Scanning Penetration testing & Exploitation Environment Ubuntu 12.04 LTS (Precise Pangolin) is purposefully selected as the base Operating System to obtain supports from Ubuntu for a long duration (till Apr 2017). It is packed with featured security tools with very less resource consumption and higher degree of stability. Thanks to Back Track, Blackbuntu, CAINE and DEFT and many others for inspiration. Being a sole developer to this distro, I wish it...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Shell OS
    Build by Rajib Acharyya(Spid3r64) ANONIMITY Metasploit Armitage Cobalt Strike & veil WIRELESS SECURITY SNIFFERS PYTHON,PERL & RUBY FORENSICS BRUTE FORCE & DDOS ANDROID TOOLS Based on : Ubuntu 12.04 LTS(32bit) (Custom Backbox) user:root pass:india Kernel version =>3.8.0-29 generic Desktop environment's => xfce,conky,Docky Version 1.0(full) Extra Softwares inbuilt => Skype,Virtualbox,Filezila,Chromium Browser,XDM(Xtreme Download Manager) ,Gimp,Python...many more Credit List: Pedro Ubuntu(r00tsect0r) For Netool.sh Asif Iqbal (cobalt strike) w0lf3nst3in3 Rohit Verma(Startx) Navonil Sanpui(M3ghnath) Team BHS
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    Linux-cfyffe fork

    A custom fork of the Linux kernel.

    ...I use LUKS and LVM for everything but /boot, so I know they work when I upload the kernel. Anyway, I'll admit it, I'm a security freak, if I even think there MIGHT be a security hole, I don't rest until I've fixed it and verified it's been properly fixed, I also want my laptop to be as fast as possible, so in the end, you'll be getting a secure kernel that's about as fast as Linux can go on common home x86_64 PC hardware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    CodeName C.I.A V3 Wheezy 7.1 Kali-Linux

    CodeName C.I.A V3 Wheezy 7.1 Kali-Linux

    CodeName CIA Wheezy7.1 kali-linux IMPROVE 2 Darkc0d3 TOP-HAT-SEC Team

    System: Debian Wheezy 7.1 Stable Kernel: 3.7-trunk-amd64 x86_64 (64 bit) Multiarch Desktop: Gnome Distro: Wheezy 7.1 Kali GNU/Linux 1.0 User name: root/Pass: toor FOR IMPORTANT FIX AND TIPS: LOOK THE TICKETS AND FILES SECTION To install the distribution could begin to Default or live mode, and the Application menu select System tools >Live Installer. Video in Youtube http://www.youtube.com/watch?v=dPhLYG8Wr-g The project has keep Update all the time, there is always ways to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    DogoIDS

    DogoIDS

    Active-probing-based network IDS for wireless networks

    DogoIDS is an open-source active-probing-based network intrusion detection system (AP-NIDS) for wireless multihop networks (MANETs, Wireless Mesh Networks, Sensor Networks, etc). At this stage, DogoIDS only support the IEEE 802.11s standard for Wireless Mesh Networks. DogoIDS is now under construction in a very early stage and mainly for research purposes. However, we aim to release a stable version ready for production soon. *** IMPORTANT *** We uploaded the very first experimental...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This project is about development of Android kernel using mobile virtualization. I progressed open software project of NIPA in korea. This is result of the NIPA's open software project. And I have constantly been updating the source of project currently, and try to apply to security service using the source of project on smart devices(Smartphone, SmartTV, etc.). ---------- --- Source Release History------------------------- 1.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, "Bounds-checking interfaces". This latest upload supports building static library, a shared library and a linux kernel module.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 14
    This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    AttackVector Linux

    AttackVector Linux

    linux distro for anonymized penetration based on Kali and TAILS

    AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project's TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may compromize anonymity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Linux kernel key logger

    A Linux kernel module for logging keystrokes

    A Linux kernel module to sniff keystrokes and saving it in an in memory buffer for further reading from /dev/klg
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    ArchE17

    ArchE17 is a Linux distribution based off Arch Linux

    ArchE17 is a Linux distribution based off Arch Linux equipped with the Liquorix Kernel, Yaourt, and as the name implies, the recently released stable E17 Desktop Environment. ArchE17 will be released weekly as a rolling release LiveCD that is designed to run off a standard CD or USB drive, which means the image will always be less than 700MB. ArchE17 features a lightweight and fast desktop experience booting up only 104MB (i686) and 135MB (x86_64) of RAM.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    Hacking the linux keyboard

    Reporting keystrokes without pressing any keys

    A Linux kernel module that simulates key presses without pressing any keys, in this module i press the left key whenever the user presses any key, so that he writes from right to left instead of writing from left to right.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ubnhd2

    ubnhd2

    A native, dual-bootable ubuntu for the HTC™ HD2 Phone (qsd8250 SoC)

    ubnhd2 is a security and pentest focused ubuntu/debian system that runs natively on the HTC HD2 phone. To boot this you need the Magldr on your phone and the first FAT partition should be named "SD". The wifi drivers are not included check the Ubuntu HTC HD2 Section from forum.xda-developers.com/showthread.php?t=1975081 for more details.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Babel Enterprise
    Babel is a enterprise grade secure monitoring platfform to check OS security status: user/passwords, kernel options, file perms, patches, network setup, SUID, binary files changes and much more. All in a distributed and modular management architecture.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution. Utilizing the QUOTE feature of the TPM, it is possible to generate an Integrity measurement Report...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    broodKernel

    Latest i9001 stock kernel, heavily tweaked!

    broodKernel is a kernel that is always based on the latest i9001 kernel, the big difference between an other custom kernel is that broodKernel keeps the original zImage. This means that all stock features are available, in order to tweak it I added a lot of tweaks to the kernels ramdisk. next to the ramdisk tweaks there are 2 init.d scripts which allow you to manage broodKernel the way you want. Visit the github here: https://github.com/broodplank/broodKernel
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Entropy Monitor

    Monitor of the available entropy stored within the Linux kernel

    In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators. Examples for applications that depend on entropy (random numbers) would be the fortune(6) program, which gives a random quote, or the solitaire card game, or the shuffle option in a music...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    broodROM Business Edition

    The most powerful i9001 rom for business environments.

    This rom is for Samsung Galaxy S Plus (i9001) only, it's the little brother of broodROM, but runs on stock kernel / theme, This rom allows all possible business related actions (such as using the car charging cradle). but don't make this stock look fool you, it has great performance, additional mods, tweaks and apps, also the gps works very good (adjust the gps.conf file to your country using my GPS Configuration tool). So are you interested in a stable bug-free rom which is capable for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    squitch p.u.r.e.

    squitch p.u.r.e.

    pure pentesting distribution

    Base: Ubuntu Server Kernel: 3.2.6 Desktop: Gnome 2 Tools: angry IP scanner etherape nmap wireshark fasttrack metasploit 4.2.5 inguma w3af wapiti crunch hydra-gtk radio-network hack‘n‘slay tools .. and more..
    Downloads: 0 This Week
    Last Update:
    See Project