Skip to content

Issues: a13xp0p0v/kernel-hardening-checker

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Author
Filter by author
Loading
Label
Filter by label
Loading
Use alt + click/return to exclude labels
or + click/return for logical OR
Projects
Filter by project
Loading
Milestones
Filter by milestone
Loading
Assignee
Filter by who’s assigned
Sort

Issues list

What are the opinions about: "Allow /proc/pid/mem access override" question Further information is requested
#173 opened Dec 31, 2024 by migrgh
2 Checks Recommended by Timesys Hardening Guide CONFIG_DEBUG_BUGVERBOSE & CONFIG_ZSMALLOC new_check A new check of the Linux kernel security parameters question Further information is requested
#171 opened Dec 27, 2024 by wryMitts
proc mem force good_first_issue Good task for new contributors new_check A new check of the Linux kernel security parameters
#170 opened Dec 18, 2024 by rusty-snake
More Kernel command-line checks good_first_issue Good task for new contributors new_check A new check of the Linux kernel security parameters
#169 opened Dec 9, 2024 by rusty-snake
Add the with care column new_feature A new feature of the tool
#144 opened Jul 3, 2024 by a13xp0p0v
Add RISC-V support new_feature A new feature of the tool
#56 opened Nov 21, 2021 by a13xp0p0v
Allow redefining rules and expanding rule sets new_feature A new feature of the tool
#50 opened Feb 20, 2021 by petervanvugt
ProTip! Type g i on any issue or pull request to go back to the issue listing page.