All Projects → assimilation → assimilation-official

assimilation / assimilation-official

Licence: other
This is the official main repository for the Assimilation project

Programming Languages

python
139335 projects - #7 most used programming language
c
50402 projects - #5 most used programming language
shell
77523 projects
CMake
9771 projects
C#
18002 projects
Meson
512 projects

Projects that are alternatives of or similar to assimilation-official

Sbt Dependency Check
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+297.87%)
Mutual labels:  security-audit, owasp, security-automation
Electriceye
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (+442.55%)
Mutual labels:  security-audit, security-hardening, monitoring-tool
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+18717.02%)
Mutual labels:  security-audit, security-hardening, security-automation
Minimalistic Offensive Security Tools
A repository of tools for pentesting of restricted and isolated environments.
Stars: ✭ 135 (+187.23%)
Mutual labels:  security-audit, security-automation
Rails Security Checklist
🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
Stars: ✭ 1,265 (+2591.49%)
Mutual labels:  security-audit, security-hardening
Btle Sniffer
Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (+85.11%)
Mutual labels:  security-audit, security-hardening
Nebulousad
NebulousAD automated credential auditing tool.
Stars: ✭ 158 (+236.17%)
Mutual labels:  security-audit, security-automation
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (+236.17%)
Mutual labels:  security-audit, security-hardening
Zap Cli
A simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (+253.19%)
Mutual labels:  security-audit, owasp
ExDeMon
A general purpose metrics monitor implemented with Apache Spark. Kafka source, Elastic sink, aggregate metrics, different analysis, notifications, actions, live configuration update, missing metrics, ...
Stars: ✭ 19 (-59.57%)
Mutual labels:  monitoring-application, monitoring-tool
UBUNTU20-CIS
Ansible role for Ubuntu 2004 CIS Baseline
Stars: ✭ 136 (+189.36%)
Mutual labels:  security-hardening, security-automation
burp-aem-scanner
Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common misconfigurations and security holes.
Stars: ✭ 60 (+27.66%)
Mutual labels:  security-audit, security-automation
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (+53.19%)
Mutual labels:  security-audit, security-automation
Find Sec Bugs
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Stars: ✭ 1,748 (+3619.15%)
Mutual labels:  security-audit, owasp
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+19340.43%)
Mutual labels:  security-audit, security-hardening
Audit scripts
Scripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (+17.02%)
Mutual labels:  security-audit, security-hardening
gochanges
**[ARCHIVED]** website changes tracker 🔍
Stars: ✭ 12 (-74.47%)
Mutual labels:  monitoring-application, monitoring-tool
Marsnake
System Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-65.96%)
Mutual labels:  security-audit, security-hardening
Golang Tls
Simple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+1723.4%)
Mutual labels:  security-audit, security-hardening
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+17019.15%)
Mutual labels:  security-audit, security-hardening

Build Status Coverity Status Documentation

Welcome to the Assimilation README file :-D.

The Assimilation System Management Suite provides a variety of system management capabilities with near-zero configuration. The project web site is at assimproj.org, and commercial support and alternative licenses are available from Assimilation Systems. A more comprehensive explanation of our many capabilities can be found on the Assimilation Systems site, and on their blog.

Although we use the github issues mechanism, most of our issues can be found on Trello.

This code builds with cmake, not autotools. A more detailed Getting Started guide can be found here. The open source project home page is at http://assimproj.org/ - check it out! Please join the open source project mailing list on Mailman. This project proudly sponsored by Assimilation Systems Limited.

Dependencies

We like to have a reasonable number of things in the build environment.

In addition, the following systems are needed in the runtime environment for the CMA:

Getting Source for the Assimilation Monitoring Project

The source to the Assimilation Project can be found at https://github.com/assimilation/assimilation-official

Making It

Making The Assimilation Monitoring System from Source is done with cmake.

Making The Assimilation Monitoring System for *NIX Systems

You can follow these instructions for *NIX type systems.

  • Extract the source into "path-to-source-directory"
  • mkdir "path-to-binary-directory"
  • cd "path-to-binary-directory"
  • cmake "path-to-source-directory"
  • make install

Making RPM or DEB packages

The Cmake project provides cpack to make minimal RPM and DEB packages Cpack also makes OS X and Windows packages - but that's untested. Patches to make this work would be appreciated.

The procedure for making packages is as follows:

  • Extract the source into "path-to-source-directory"
  • mkdir "path-to-binary-directory"
  • cd "binary-directory"
  • cmake "path-to-source-directory"
  • cpack

If it can't figure out which kind of package to build, it will default to building RPMs. Patches are being solicited to build Windows and OS X packages (read the cpack docs). Other package formats aren't supported by cpack, and will have to be supported by other mechanisms.

Making The Assimilation Monitoring System for Windows

  • That's something we need to work out. An earlier verison of 'nanoprobe' did compile and run successfully on Windows

Running our Tests

There are currently two test modules that you can run after building it. They can be run like this:

- cd testcode; sh path-to-source-tree/testcode/grind.sh # Assumes you have valgrind installed.
- cd testcode; ./pinger ::1 # Does a ping test of reliable UDP
- cd cma; testify tests     # Runs significant python tests

For the testcode piece, you have to be in the cma directory of build tree. For the testify portion, you have to either be in the cma directory of the source tree or the installed version in the python install place (on my machine that's currently /usr/lib/python2.7/dist-packages/assimilation)

Other Make Targets

  • doc - makes the documentation If you just want to view the latest version online, go to http://assimmon.org/
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].