Tool and Usage
|Latest release||0.4.4 |
Why this tool?
Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.
How it works
Bane works by running a Docker container while bane monitors it. Any required permissions will then be stored in the profile.
Usage and audience
bane is commonly used for application security, security monitoring, or system hardening. Target users for this tool are security professionals and system administrators.
- Command line interface
- Docker support
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 500 GitHub stars
- + The source code of this software is available
Supported operating systems
Bane is known to work on FreeBSD, Linux, macOS, Microsoft Windows, and Solaris.
Similar tools to bane:
Anchore is a toolkit to perform in-depth container analysis, inspection, and controlling them. Among security scanning, it can do a wide range of functions.
Dagda is a security tool to perform static analysis of known vulnerabilities, malware and threats in Docker images and containers. It monitors both the Docker daemon and running containers to find anomalies and suspicious activities.
Subuser is a tool that allows commands to be executed with restrictions. It works on Linux and can increase security by lowering access levels.
Found an improvement? Help the community by submitting an update.