Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution.
Utilizing the QUOTE feature of the TPM, it is possible to generate an Integrity measurement Report that accurately reflects the current programs that have run or are running, and these values can be compared against a set of golden values taken from the install image of the machine. ...
Monitor of the available entropy stored within the Linux kernel
In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators.
Examples for applications that depend on entropy (random numbers) would be the fortune(6) program, which gives a
random quote, or the solitaire
card game, or the shuffle option in a music...
...The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project.
This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons.
Latest Code can be found at:
https://github.com/PeterHuewe/linux-tpmdd
Patchwork:
https://patchwork.ozlabs.org/project/tpmdd/list/
Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.
The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
WHIPS (Windows Host Intrusion Prevention System) is a Host Intrusion Prevention System for Windows NT/XP/2003. WHIPS uses the system call interposition technics and it is developed as a kernel module.
- DSI is a security framework addressing security needs of carrier-grade Linux clusters. - DigSig is a linux kernel module checking RSA signatures of ELF executables at run-time. **Those projects are no longer maintained**
Linux Kernel Immune System (KIS).
KIS is a immune-inspired Intrusion Prevention System (IPS) developed as part of the Linux kernel. It's a hybrid of anomaly and signature based approaches.
EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x loadable module that redirects tcp connections (to user-defined target hosts) through socks 4/5 chains, in a complete transparent way.
Dark/sk sources are kernel patchset projects created by predatorfreak (Brett G.), focused on maintaining stablity and scalabliy. Everything that goes into these patchsets is selected based on these goals.
This project aims to pool together as many kernel projects as possible, ironing out conflicts where possible, so that experimental kernel projects can get greater exposure, safely, and so that those projects can be tested under much more varied conditions
WindowsNT 5.x kernel driver designed to hide things like: processes, files, network connections and open ports. It also provides keylogger and communication with userspace tool that is authenticated with password.
Development of Linux kernel extensions which enable intrusion detection and prevention functionalities based on NSA's SELinux (http://www.nsa.gov/selinux/).
PSeudo terminal Intrusion Detection System.
The kernel part plugs into terminal processing subsystem and logs hashed terminal lines.
The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
The dude is a UNIX debugging package independent of the ptrace() system call; it consists of a kernel module [the_dude.o], a library to interface with the module [libduderino.so], and an ncurses client [ddbg] .
Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.