KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hypervisor escape techniques. It enables persistent cross-VM access, stealth process hiding, UEFI firmware backdoors, and more all while evading modern detection systems.
☆22Apr 2, 2025Updated last year
Alternatives and similar repositories for kernelghost
Users that are interested in kernelghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆11Mar 18, 2025Updated last year
- An eBPF-based traffic obfuscation system that try to disguises WireGuard protocol traffic to bypass DPI and government censorship☆61Updated this week
- ☆21Oct 3, 2025Updated 6 months ago
- ☆22Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆15Jan 30, 2025Updated last year
- A backstage extension for Quarkus☆15Updated this week
- Simple and clear Rust implementation of the Af_XDP socket and XDP helpers.☆27Jul 9, 2025Updated 9 months ago
- Code-snippets for developing eBPF programs☆20Oct 6, 2025Updated 6 months ago
- lightmon is a lightweight, Docker/K8s container-aware network traffic monitoring tool based on eBPF technology.☆15May 15, 2025Updated 10 months ago
- a CLI tool for generating logs and metrics from eBPF telemetry, producing flamegraphs and actionable observability outputs☆16Mar 28, 2025Updated last year
- A tutorial about git☆12Dec 3, 2020Updated 5 years ago
- Translate and Transcribe videos using AWS☆12Oct 21, 2024Updated last year
- ☆11Apr 17, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Helping people get healthier through organic nutrition☆12Jul 10, 2024Updated last year
- AI-Powered Code Reviews for Best Practices & Security Issues Across Languages☆21Aug 8, 2025Updated 8 months ago
- 一个人的安全笔记。☆13Dec 2, 2021Updated 4 years ago
- Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.☆21Jul 11, 2022Updated 3 years ago
- This project is a minimal eBPF-based Layer 4 (Transport Layer) network monitor that uses tc (Traffic Control) hooks to trace ingress and …☆30Aug 26, 2025Updated 7 months ago
- ☆10May 18, 2022Updated 3 years ago
- inline ip address types☆20Updated this week
- ☆19Mar 16, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year
- ☆21Aug 13, 2025Updated 7 months ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- appieSniper is a python program to get notifications on overblijvers at nearby Albert Heijn supermarkets, this way you can claim you pack…☆11Mar 26, 2026Updated 2 weeks ago
- Generates Wireguard configuration files☆15Jul 26, 2022Updated 3 years ago
- A scraper made using beautiful soup 4 in python. Tailor made for extracting news from moneycontrol.com. Issue pull request for different …☆12Jun 21, 2020Updated 5 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated 2 weeks ago
- The kernel tracer that attaches eBPF probes to containers for capturing TLS traffic☆37Feb 8, 2026Updated 2 months ago
- Dynamically configure Juniper network devices using metadata from Netbox. Mirror of https://gerrit.wikimedia.org/g/operations/software/ho…☆14Jan 12, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆17Apr 4, 2026Updated last week
- Salt execution module and state to manage SAP Applications (HANA only at the moment) and SUSE Linux Enterprise High Availability componen…☆14Sep 11, 2025Updated 7 months ago
- Whitepaper for the coraza-server implementation☆11Mar 16, 2022Updated 4 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Ollama api implementation for spin☆11Feb 16, 2024Updated 2 years ago
- OpenTelemetry Demo Semana DevOps LinuxTips☆17Feb 9, 2025Updated last year
- ☆15Mar 24, 2026Updated 2 weeks ago