Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Mar 2013 19:58:38 +0000
From: Tim Brown <>
Cc: Corey Bryant <>,
Subject: Re: [kernel-hardening] Security vulnerability tools

On Wednesday 27 Mar 2013 19:54:04 Corey Bryant wrote:
> Hi,
> I'd like to get a better understanding of tools used in the open source
> community (kernel and user space) to detect security vulnerabilities.
> I have a list below to get started.  If anyone has any input, I'd
> appreciate it!
> I'll plan on updating with
> anything it doesn't already have.

Hey Corey,

One you might want to add is unix-privesc-check from myself, @inquisb and 
@pentestmonkey.  There are two versions in existence:

1.x - @pentestmonkey's quick and dirty with some hacks by me
trunk - a full blown privesc check framework designed by me with contributions 
from the other two, it has multiple modes of operation, a standard library 
which can be leveraged for new checks and (already) enhanced capabilities.   
Its not perfect yet, I still need to clean it up and port it to the commercial 
UNIX platforms we support but it should give a good idea of where we're going

Once I've stabilised the API of trunk, it will become 2.x and we'll open it up 
formerly for contributions.

It's on Google Code if people want to take a look:


Tim Brown

Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.