Showing 38 open source projects for "kernel-br"

View related business solutions
  • Track time for payroll, billing and productivity Icon
    Track time for payroll, billing and productivity

    Flexible time and billing software that enables teams to easily track time and expenses for payroll, projects, and client billing.

    Because time is money, and we understand how challenging it can be to keep track of employee hours. The constant reminder to log timesheets so your business can increase billables, run an accurate payroll and remove the guesswork from project estimates – we get it.
    Learn More
  • Taking the Paper Out of Work Icon
    Taking the Paper Out of Work

    For organizations that need powerful ECM and document automation software

    The Square 9 AI-powered intelligent document processing platform takes the paper out of work and makes it easier to get things done with digital workflows.
    Learn More
  • 1
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    ...Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 71 This Week
    Last Update:
    See Project
  • 2
    stegfs is a steganographic file system in userspace. It uses the FUSE module which allows it to be incorporated into more than just the Linux Kernel, i.e. it's also known to work in FreeBSD :) For more details visit: https://albinoloverats.net/projects/stegfs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Casper-fs

    Casper-fs

    Casper-fs is a Custom LKM generator to protect and hide files.

    Casper-fs is a Custom Hidden Linux Kernel Module generator. Each module works in the file system to protect and hide secret files.The motivation: An attacker can read every file in your machine in a bad situation. But if you have a Casper-fs custom module, the attacker will not find the hidden kernel module that has functions to turn any file invisible and protect to block read/remove/edit actions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Parrot Project

    Parrot Project

    Security, Development and Privacy Defense, all in one place.

    Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.
    Leader badge
    Downloads: 184 This Week
    Last Update:
    See Project
  • We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform Icon
    We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform

    Designed by event planners for event planners, the EventsAIR platform gives you the ability to manage your event, conference, meeting or function with

    EventsAIR have been anticipating and responding to the ever-changing event industry needs for over 30 years, providing innovative solutions that empower event organizers to create successful events around the globe.
    Learn More
  • 5
    ...It is a tool for detecting changes in filesystem and reporting it immediately.It uses a simple config file in XML format and is based on inotify, a file change notification system in the Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    ...The kernel already has a module to use the rtl2832 for its intended purpose, listening to radio, so if you want to use it to generate entropy, you will have to blacklist that module, so it doesn't load. If it is loaded, this program will not be able to acquire the rtl2832 device, and won't run. Create the file /etc/modprobe.d/blacklist-dvb_usb_rtl28xxu.conf with the line blacklist dvb_usb_rtl28xxu in it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution. Utilizing the QUOTE feature of the TPM, it is possible to generate an Integrity measurement Report that accurately reflects the current programs that have run or are running, and these values can be compared against a set of golden values taken from the install image of the machine. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Entropy Monitor

    Monitor of the available entropy stored within the Linux kernel

    In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators. Examples for applications that depend on entropy (random numbers) would be the fortune(6) program, which gives a random quote, or the solitaire card game, or the shuffle option in a music...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Professional Email Hosting for Small Business | Greatmail Icon
    Professional Email Hosting for Small Business | Greatmail

    Ready to switch to a more reliable and secure email hosting solution?

    Dependable cloud based email hosting with spam filtering, antivirus protection, generous storage and webmail. Compatible with Outlook and all other POP3/IMAP clients. High volume SMTP service for responsible senders. Outbound relay service for transactional messages, email marketing campaigns, newsletters and other applications. Dedicated email servers, clustering and multiple IP load balancing for high volume senders. Fixed monthly cost with unlimited sending and reputation monitoring. Greatmail is an email service provider (ESP) specializing in business class email hosting, SMTP hosting and email servers. For ISPs, application programmers and cloud developers, we also provide custom solutions including dedicated IP servers and process specific, load balanced configurations with multiple servers.
    Learn More
  • 10
    SELinux targeted policy module which extends kernel mandatory access control policies to the standalone git-daemon server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenFirewall (only for windows XP)
    Only for windows XP OpenFirewall is based on two lines of defence first WIPFW ( Kernel-mode driver ) and second tdifw ( application-mode TDI-driver ) . Is a Windows firewall easy to use like the commercial products
    Downloads: 7 This Week
    Last Update:
    See Project
  • 12
    The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    WHIPS (Windows Host Intrusion Prevention System) is a Host Intrusion Prevention System for Windows NT/XP/2003. WHIPS uses the system call interposition technics and it is developed as a kernel module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Interceptor - Mac OS X filesystem control. Interceptor uses a kernel extension to block write and delete accesses to the user's filesystem, and presents a simple alert allowing the user to allow or deny the write or delete. Requires Mac OS X 10.4.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project aims to pool together as many kernel projects as possible, ironing out conflicts where possible, so that experimental kernel projects can get greater exposure, safely, and so that those projects can be tested under much more varied conditions
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    WindowsNT 5.x kernel driver designed to hide things like: processes, files, network connections and open ports. It also provides keylogger and communication with userspace tool that is authenticated with password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Development of Linux kernel extensions which enable intrusion detection and prevention functionalities based on NSA's SELinux (http://www.nsa.gov/selinux/).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PSeudo terminal Intrusion Detection System. The kernel part plugs into terminal processing subsystem and logs hashed terminal lines. The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust management system. It is accessible via IPC, network (OpenSSL support) and kernel-space.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Psniff is a packet sniffer and spoofer based on the PF_PACKET protocol family provided in kernel >=2.0 . Some of the protocols initially supported are IPV4,IPV6,TCP,UCP,BGP,ICMP,RIP, NTP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    To develop an auditing package that is compliant with the U.S. Government’s C2 standards for security and, if possible, provides a mechanism for allowing the information collected to be admissible as evidence in a court of law.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ...The primary design goals are security, ease of use, and performance, in that order. It takes advantage of advanced features of iptables, tcpwrappers, and the Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Get your files crypted in easy way, absolutely non-painful. For Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB