Acceis / eBPF-hide-PIDLinks
This tool have the power to hide any PID/directory in the Linux kernel
☆30Updated last year
Alternatives and similar repositories for eBPF-hide-PID
Users that are interested in eBPF-hide-PID are comparing it to the libraries listed below
Sorting:
- ☆89Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆53Updated 8 months ago
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- kubernetes rootkit☆34Updated last year
- eBPF hacks☆187Updated 11 months ago
- Use eBPF to inject chaos into local processes☆65Updated last year
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- ☆63Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- KeyTrap (DNSSEC)☆43Updated last year
- A collection of bypasses and exploits for eBPF-based cloud security.☆25Updated last year
- A simple Meterpreter stager written in Rust.☆43Updated 3 weeks ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆88Updated last year
- ☆31Updated 2 years ago
- io_uring based rootkit☆244Updated 7 months ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- nysm is a stealth post-exploitation container.☆266Updated 5 months ago
- io_uring based network scanner written in Rust☆45Updated last month
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Updated 2 years ago
- End-to-end Encrypted DNS Tunnelling and C2 framework☆86Updated last month
- Kubernetes offensive framework built in eBPF☆39Updated 2 years ago
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Monarch - The Adversary Emulation Toolkit☆64Updated 10 months ago
- Golang Port Knocking for Linux + Windows☆18Updated 3 years ago