Landlock lets you add extra security layers to Linux apps, helping restrict file and process access for better protection without special privileges.
Create secure Linux sandboxes without root access
Landlock is a security tool designed to help you create sandboxes for Linux applications. It lets you restrict what files and resources your apps can access, adding an extra layer of protection even if you don't have special system privileges.
With Landlock, you can set up access controls that limit the impact of bugs or unexpected behaviors in your programs. It's especially useful for developers and sysadmins who want to reduce security risks without complicated setups or elevated permissions.
The site offers clear documentation, demos, and resources to help you get started with Landlock. Whether you're building new applications or securing existing ones, you can use Landlock to make your Linux environment safer and more robust.
Discover websites similar to Landlock.io. Section 1 prioritizes sites with matching domain extensions and/or languages. Section 2 offers worldwide alternatives.
Csper helps you build, deploy, and monitor Content Security Policies to protect your website and easily manage browser security reports.
Consensys Diligence offers expert smart contract audits and blockchain security services to help you launch and maintain secure Ethereum applications.
Checkov scans your cloud infrastructure code to spot misconfigurations and security issues before deployment, helping you build safer cloud environments.
Cyfrin offers smart contract security audits, blockchain developer courses, and research tools to help make web3 protocols safer and more reliable.
Hacken offers blockchain security audits, AI-powered compliance, and penetration testing to help crypto and Web3 projects stay secure and resilient.
Rönd is an open-source tool that helps you enforce security policies on your APIs and data, running as a lightweight sidecar in Kubernetes environments.
Theori offers offensive security solutions powered by hacker insights to help organizations stay ahead of cyber threats and protect their innovations.
VeraCrypt is a free, open-source tool for encrypting disks on Windows, Mac, and Linux, helping you keep your files secure and private at all times.
Wiz offers an all-in-one cloud security platform that helps teams detect, prevent, and respond to threats, making cloud development safer and faster.
Bastillion is a web-based SSH management tool that lets you control access, manage public SSH keys, and audit sessions securely from one place.
Learn about cryptographic hash functions and how they protect digital signatures, file integrity, and software updates across digital assets.
BitKey is a secure, self-contained Live CD/USB for Bitcoin users, making air-gapped transactions and offline cold storage safer and easier to manage.
Test and explore WebAuthn authentication methods in your browser. Register credentials, try advanced settings, and learn about passwordless security online.
Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.
Rudder helps automate IT security by managing configurations, patching, and compliance for Linux and Windows systems across hybrid infrastructures.
Prosopo Procaptcha offers dynamic CAPTCHA and PoW tools to block bots, defend against cyber threats, and protect user privacy with GDPR compliance.
Codiga lets you analyze code for quality and security in real time, create custom rules, and manage code snippets across your favorite development tools.
Uncoder.io lets you write, edit, and convert Roota and Sigma rules online for free. Streamline detection engineering with this simple, browser-based IDE.
Portmaster is a free, open-source app that lets you control and monitor your computer's network connections for better privacy and security.
Linkerd is an open-source service mesh for Kubernetes that boosts security, observability, and reliability—no code changes needed.
crxcavator scans Chrome extensions for security risks, helping you check extensions for privacy and safety before you install them.
Explore YARA's official documentation to learn how to identify and classify malware using pattern-based rules. Includes guides, modules, and API info.
Scan and analyze any website or URL for suspicious or malicious activity. Get detailed security insights before you visit or interact with online links.
Istio is an open platform that helps you manage, secure, and monitor microservices across your cloud-native apps. Try it to simplify service management.
Explore a comprehensive database of security vulnerabilities with details and guidance to help you identify, understand, and fix security issues in your software.
Traefik Labs offers cloud-native API management and connectivity tools, making it easy for DevOps teams to secure and manage APIs across any environment.
SPIFFE provides a secure identity framework for cloud-native apps, helping you manage and verify workloads across distributed systems with ease.
Personal blog sharing insights and articles on OS kernel development and security, with resources, project updates, and technical guides (in Russian).
ProjectDiscovery helps you find and manage real security vulnerabilities in your infrastructure, reducing false positives and streamlining your workflow.
Find Security Bugs offers a SpotBugs plugin to help you scan Java web apps for security vulnerabilities and improve code safety during development.
Aikido helps developers secure code, cloud, and apps by finding and fixing vulnerabilities fast—all in one easy-to-use security platform.
Astra Security offers a continuous pentesting platform with automated vulnerability scanning, helping you secure web, API, cloud, and mobile apps easily.
IriusRisk is an automated threat modeling tool that helps teams design and build secure software by identifying and remediating security risks early.
Tamarin Prover lets you verify security protocols by modeling and analyzing them for vulnerabilities and correctness in a symbolic framework.
Explore software-based entropy sources and Linux crypto tools for improved randomness, security, and performance in cryptographic applications.
ZAP lets you find and fix security issues in your web apps. Get started easily with guides, downloads, and a helpful community for web security testing.
Trail of Bits offers expert security research and solutions to help organizations protect software, reduce risks, and strengthen code against cyber threats.
Docker Scout helps developers spot and fix security issues in software supply chains, providing real-time insights for safer cloud-native app deployments.
Suhosin adds advanced security features to PHP servers, helping protect websites and applications from vulnerabilities in PHP code and core.
Grsecurity offers a secure Linux kernel replacement with advanced exploit prevention, helping you protect systems from both known and unknown threats.