Linux system security tools

Linux system security tools

  • Storage, server prices drop as inflation eases Server and storage prices declined in June, reflecting cooling inflation, but companies remain intent on containing costs and .
  • Commercial space industry opportunities set to take off As NASA sets its sights on the next lunar landing and long-duration space flights, commercial companies are rising to meet the .
  • The negative impact of technical debt Adding features on top of poorly written code is a recipe for a bad reputation and a compromised user experience. Here’s a look .
  • XSS zero-day flaw in Zimbra Collaboration Suite under attack A manual workaround is currently available for a cross-site scripting vulnerability in Zimbra Collaboration Suite, though a patch.
  • Rein in cybersecurity tool sprawl with a portfolio approach Market consolidation can counterintuitively exacerbate cybersecurity tool sprawl, with many products offering overlapping .
  • Microsoft: Government agencies breached in email attacks While Microsoft mitigated the attacks and found no evidence of further access beyond the email accounts, the Outlook breaches .
  • An introduction to smartNICs and their benefits SmartNICs offload packet processing tasks from server CPUs, freeing up resources for application performance. They can run packet.
  • IOTech Edge Connect frees data from factory floor devices IOTech designed Edge Connect to collect data from operational technology and send it to IT systems that monitor and control .
  • 5 techniques to debug network issues in Linux and Windows Debugging a network issue should start with basic troubleshooting. If that doesn’t fix it, admins should check, verify and .
  • RHEL users question Red Hat’s reliance on CentOS Stream Despite criticism from developers, Red Hat continues its commitment to CentOS as the delivery vehicle for RHEL, believing it .
  • 8 benefits of data center virtualization Organizations with virtualized data center components can save on hardware, comply easier with regulations and increase speed. .
  • Assess the environmental impact of data centers Data centers have faced scrutiny about their environmental impact in recent years. Assess their impact to find ways to reduce the.
  • Dremio names former Splunk executive new CEO The former Splunk executive takes over as the data lakehouse vendor’s leader, aiming to raise the company’s profile to .
  • Grow data trust to avoid customer and corporate consequences A lack of data trust can undermine customer loyalty and corporate success. To avoid the consequences, understand the effects of .
  • Databricks introduces Delta Lake 3.0 to help unify data As part of the open source community developing the data storage platform, the vendor unveiled the platform’s latest iteration .
Читайте также:  Отключить bluetooth kali linux

Источник

Linux security tools (top 100)

Supporting image for top 100 of Linux security tools displaying a bookcase

There is a wide range of security tools available for Linux and other platforms. To make them easier to find, we started an extensive review process to gather and document them. The goal of this top 100 is to showcase the best Linux security tools. By best there is an implied level of quality, healthy community and good governance of the project.

Requirements for listing

  • The project has a license that qualifies as open source software
  • The software is being maintained by one or more developers
  • The source code of the software is available

Ranking factors

The rankings of the list is determined by a combination of manual reviews and automated analysis. The list is updated weekly and then sorted based on a quality score. The score itself is measured by several ranking factors.

  • Availability of basic project details such as a defined license
  • Quality of documentation
  • Last release and release interval

Tips to find the right tool

As there are so many open source security tools available, it can be hard to find the best one for the job. All the reviewed tools include tags and one or more categories. This way you can easily find alternatives. If you want to quickly find a specific category, such as vulnerability scanners, type in the word vulnerability or scan in the search bar.

Free versus paid

Although paid tools might benefit from commercial support, there are many freely alternatives available. Depending on your task, it can be useful to run two or more similar tools. One of them can be paid, while the other is free. By running multiple tools you benefit from having some overlap, but also what each of the tools might have missed.

Читайте также:  Linux отмонтировать все диски

New tools

Another interesting area is searching on GitHub for tools that are early in their development cycle. They might be still immature and even lack documentation, but at the same time include new techniques or types of attacks. This area is useful for recently discovered vulnerabilities where proof-of-concept code snippets might be available via these coding platforms.

Security tools ranked

1. Frida (reverse engineering tool)

black-box testing, reverse engineering

Frida allows developers and researchers to inject custom scripts into black box processes. This way it can provide a hook into any function, allowing to trace executed instructions. The source code is not needed. Frida even allows direct manipulation and see the results. The tool comes with bindings for different programming languages, allowing to interact with processes. Example of the bindings that Frida provides include Python, Swift, .NET, Qt/Qml, and C API.

Источник

Оцените статью
Adblock
detector