Search Results for "kernel security" - Page 2

Showing 94 open source projects for "kernel security"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Ateraโ€™s AI agents donโ€™t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Capstone

    Capstone

    Capstone disassembly/disassembler framework

    Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community. Created by Nguyen Anh Quynh, then developed and maintained by a small community, Capstone offers some unparalleled features. Support multiple hardware architectures: ARM, ARM64 (ARMv8), Ethereum VM, M68K, Mips, MOS65XX, PPC, Sparc, SystemZ, TMS320C64X, M680X, XCore and X86 (including X86_64). Having clean/simple/lightweight/intuitive...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    SWUpdate

    SWUpdate

    Software Update for Embedded Systems

    SWUpdate is a Linux Update agent with the goal to provide an efficient and safe way to update an embedded Linux system in the field. SWUpdate supports local and OTA updates and multiple update strategies and it is designed with security in mind. To start with SWUpdate, it is suggested you look at the documentation and build for one evaluation board (or you run SWUpdate on your host for a first overview). If you plan to update your device locally or remotely, SWUpdate is the right framework...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Unikraft

    Unikraft

    A next-generation cloud native kernel designed to unlock performance

    Unikraft powers the next generation of cloud-native, containerless applications by enabling you to radically customize and build custom OS/kernels; unlocking best-in-class performance, security primitives, and efficiency savings. Unikraft optimizes resource utilization, leading to smaller footprints (meaning higher server saturation) and improved efficiency in resource-constrained environments. Unikraft is an open-source project driven by a vibrant community of over 100 developers, fostering...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Trusted Boot (tboot) is an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution Technology (Intel(R) TXT) to perform a measured and verified launch of an OS kernel/VMM. mercurial repo: http://hg.code.sf.net/p/tboot/code.
    Leader badge
    Downloads: 30 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&Bโ€™s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 5
    Hardened Slarpx

    Hardened Slarpx

    Experimental hardened Linux based on Xennytsu and Poison engine

    WARNING: EXPERIMENTAL / UNSTABLE RESEARCH PROJECT. NOT INTENDED FOR DAILY USE. Hardened Slarpx is a Debian-based Linux distribution built with a strict security-first approach. It uses a multi-layered defense model with aggressive mitigations and extensive kernel-level hardening. Due to its highly restrictive firewall policy, anonymization tools and certain network protocols are intentionally unsupported. The distribution includes two custom security modules: Poison and Xennytsu. Poison disrupts the deterministic timing required by exploit code by injecting random delays when abnormal behavior is detected, reducing the reliability of timing-based attacks. ...
    Downloads: 32 This Week
    Last Update:
    See Project
  • 6
    PH4NTXM

    PH4NTXM

    Operational-grade, live, and disposable operating system.

    PH4NTXM is a live-only, stateless Linux operating system engineered for environments where post-mortem analysis, memory inspection, and identity correlation are realistic threats. Each session is ephemeral by design. System state, memory contents, and identity artifacts are intentionally short-lived and are not expected to survive shutdown, reboot, or failure. Poweroff, panic, and crash paths are treated as compromise events and converge on enforced teardown mechanisms. PH4NTXM...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 7
    NekoHyperSeed

    NekoHyperSeed

    NekoHyper Seed Modified Xiaomi HyperOS for marble/marblein device

    Feature: no binary modification (except OFRP and melt kernel) and only added minimal config file modification needed by feature unlock to keep every thing user-side trusted and reviewable Stable and keep updated to Xiaomi offical You can keep your userdata after each update Unlock features without losing security Telegram Group: https://t.me/nekohyper_official ไธบไธญๅ›ฝ็”จๆˆทๆไพ›็š„้•œๅƒไธ‹่ฝฝ็ซ™: https://nhs.ykmiog6pbx.cn
    Downloads: 74 This Week
    Last Update:
    See Project
  • 8
    TOMOYO Linux is a LSM module which focuses on behavior of processes.TOMOYO Linux can be used as a system analysis tool as well as an access restriction tool like SELinux and Smack. TOMOYO Linux has been merged in Kernel 2.6.30.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 9
    OpenFW UTM Community
    OpenFW UTM Community is a "turn-key" , fork solutions Endian Firewall UTM Community, linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxy HTTP with antivirus support, content filtering of Web...
    Downloads: 20 This Week
    Last Update:
    See Project
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 10
    Dimensional Rift OS

    Dimensional Rift OS

    Privacy,Security Focused Distro For I2P

    Dimensional Rift is a Debian-based GNU/Linux distribution focused on privacy and security. The system is built entirely around I2P (Invisible Internet Project), a peer-to-peer (P2P) anonymous communication network. I2P uses a technique called garlic routing, a form of multi-layer encryption that makes traffic analysis more difficult while also providing protection against attacks.Dimensional Rift comes with a hardened Firefox variant specifically configured for I2P. This browser can only...
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 11
    ...Where as, arm64 builds have random reboots, especially if you have 2GB variant. Note: The ROM is not being developed anymore, only Security Patches are being updated. So, if something doesn't work don't expect it to get fixed. Also, note that some Banking apps doesn't work. Test ROM fully before using it as daily driver.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    nsjail

    nsjail

    A lightweight process isolation tool that utilizes Linux namespaces

    A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security. It utilizes Linux namespace subsystem, resource limits, and the seccomp-bpf syscall filters of the Linux kernel.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: โ—...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    NebiOS Alternative Mirror (Official)

    NebiOS Alternative Mirror (Official)

    An Ubuntu Linux-based OS that aims to end user.

    NebiOS is Ubuntu-based secure, privacy-focused universal OS for daily life, creativity, gaming & more. Official mirror - use if main site has download issues. Main site: https://nebios.org โš ๏ธ DON'T DOWNLOAD FROM UNKNOWN SOURCES! ๐Ÿ›ก๏ธ Privacy: NebiOS has no telemetry, no background data services, no tracking daemons, and cannot send any personal data without user action. Full policy: nebisoftware.com/legal/privacy.html === ๐Ÿš€ NebiOS X out now! โš ๏ธ Note on Virtual Machines:...
    Leader badge
    Downloads: 36 This Week
    Last Update:
    See Project
  • 15
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16

    Syslogd2

    High capacity syslog data collection, filtering, and management.

    Syslogd2 is a syslog daemon that has been completely re-imagined specifically for use in network environments. It is multi-threaded, scalable and versatile with features designed for both network and host managers. Each Syslogd2 binary is customized from a set of over 20 features at compile-time. It can support input from text files, named-pipes, Linux kernel and user-defined Linux and (both IPv4 and IPv6) IP sockets (both UDP and TCP). It provides a pre-loadable name-cache that can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    cerberuscms2

    cerberuscms2

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    LibertyOS

    LibertyOS

    The kernel for LibertyOS

    ...The kernel reflects these values through clean code, modular design, and a focus on fundamental security practices.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Kernelhub

    Kernelhub

    Kernel privilege escalation vulnerability collection

    The original intention of making the project is for, learning, analyzing, and research the latest kernel vulnerabilities are not needed to see the system and related content. This project is a collection of proprietary, except for test failure or unspecified Exp, Demo GIF map. If there is an omission of the omission of CVE vulnerabilities, please join your issues and bring your use of code. Project code is prohibited from testing in a real environment! The reliability of the code is...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Anti_ransomware
    ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—บ / ๐˜‡๐—ฒ๐—ฟ๐—ผ๐—ฑ๐—ฎ๐˜† ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† _ Contains advanced security within the kernel, denying use of user memory not allowing user identification / This security allows to stop ransomware attacks _ ! Remove memory / wipe user-space and kernel after system shutdown * Browse anonymously without leaving a trace / tor / privoxy > Sign all operating system and boot verification . Integrity Measurement Architecture _ Subsystem is responsible for calculating the hashes of files and programs before they are loaded - / integrates new security, blacklist and secure boot smack , ๐—ก๐—ฒ๐˜„ ๐—ฉ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป : Faster loading, app update, full system in sandbox # / Live password : live - Some apparmor profiles / Credits / Alexandre Pujol .
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    XNU

    XNU

    Legacy mirror of Darwin Kernel

    ...This hybrid architecture merges the microkernel modelโ€™s message-passing flexibility with the monolithic performance and direct hardware control typical of Unix-like systems. XNU handles essential kernel responsibilities such as memory management, multitasking, interprocess communication (IPC), device I/O, system calls, security enforcement, and scheduling across both single and multi-core architectures.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    USB Gadget Tool

    USB Gadget Tool

    Convert your Android phone to any USB device you like

    Convert your Android phone to any USB device you like. USB Gadget Tool allows you to create and activate USB device roles, like a mouse or a keyboard. Connected USB hosts (e.g. a normal computer) will then identify your Android device only under that role. It can also be used to deactivate the standard USB Gadget (including mtp, adb, etc.), e.g. for security reasons.
    Downloads: 30 This Week
    Last Update:
    See Project