{"id":22775,"date":"2021-07-24T20:55:15","date_gmt":"2021-07-24T20:55:15","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=22775"},"modified":"2021-07-24T20:56:19","modified_gmt":"2021-07-24T20:56:19","slug":"top-11-free-open-source-tools-for-system-auditing-for-software-engineers","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/top-11-free-open-source-tools-for-system-auditing-for-software-engineers\/","title":{"rendered":"Top 11 free open source tools for system auditing for software engineers"},"content":{"rendered":"\n<p>   \ud83d\udd38&nbsp;<a href=\"https:\/\/www.ossec.net\/\" target=\"_blank\" rel=\"noopener\"><strong>ossec<\/strong><\/a>&nbsp;&#8211; actively monitoring all aspects of system activity with file integrity monitoring.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/security_guide\/chap-system_auditing\" target=\"_blank\" rel=\"noopener\"><strong>auditd<\/strong><\/a>&nbsp;&#8211; provides a way to track security-relevant information on your system.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.nongnu.org\/tiger\/\" target=\"_blank\" rel=\"noopener\"><strong>Tiger<\/strong><\/a>&nbsp;&#8211; is a security tool that can be use both as a security audit and intrusion detection system.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/cisofy.com\/lynis\/\" target=\"_blank\" rel=\"noopener\"><strong>Lynis<\/strong><\/a>&nbsp;&#8211; battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/rebootuser\/LinEnum\" target=\"_blank\" rel=\"noopener\"><strong>LinEnum<\/strong><\/a>&nbsp;&#8211; scripted Local Linux Enumeration &amp; Privilege Escalation Checks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/installation\/rkhunter\" target=\"_blank\" rel=\"noopener\"><strong>Rkhunter<\/strong><\/a>&nbsp;&#8211; scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/hasherezade\/pe-sieve\" target=\"_blank\" rel=\"noopener\"><strong>PE-sieve<\/strong><\/a>&nbsp;&#8211; is a light-weight tool that helps to detect malware running on the system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd38&nbsp;ossec&nbsp;&#8211; actively monitoring all aspects of system activity with file integrity monitoring.&nbsp;&nbsp;\ud83d\udd38&nbsp;auditd&nbsp;&#8211; provides a way to track security-relevant information on your system.&nbsp;&nbsp;\ud83d\udd38&nbsp;Tiger&nbsp;&#8211; is a security tool that can be use both as a security audit and intrusion detection system.&nbsp;&nbsp;\ud83d\udd38&nbsp;Lynis&nbsp;&#8211; battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.&nbsp;&nbsp;\ud83d\udd38&nbsp;LinEnum&nbsp;&#8211; scripted Local Linux Enumeration&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-22775","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=22775"}],"version-history":[{"count":2,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22775\/revisions"}],"predecessor-version":[{"id":22777,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22775\/revisions\/22777"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=22775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=22775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=22775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}