Lind-Project / safeposix-rustLinks
Rust implementation of SafePOSIX
☆13Updated 4 months ago
Alternatives and similar repositories for safeposix-rust
Users that are interested in safeposix-rust are comparing it to the libraries listed below
Sorting:
- Lind: Secure Lightweight Adaptive Isolation☆32Updated 3 months ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆67Updated 3 years ago
- ☆465Updated 3 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆183Updated last year
- Linux Security Hardening for Confidential Compute☆68Updated last year
- eBPF verifier based on abstract interpretation☆428Updated this week
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- ☆40Updated 2 weeks ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- COCONUT-SVSM☆177Updated this week
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆41Updated last month
- OCI hook to trace syscalls and generate a seccomp profile☆333Updated 3 weeks ago
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆105Updated last year
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Updated 3 years ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆16Updated 3 years ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆68Updated 10 months ago
- ☆12Updated 8 months ago
- Lightweight fuzzing of a memory snapshot using KVM☆462Updated last year
- Trace deep kernel events through eBPF and lsm hooks☆39Updated 4 years ago
- ☆41Updated 3 weeks ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last week
- A CLI tool for creating secure by design/default source repos.☆26Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- A set of vulnerable C code snippets (with mapped CVEs)☆79Updated last year
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 5 months ago
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆230Updated last year
- in-toto Enhancements☆19Updated 7 months ago
- ☆23Updated last year
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆332Updated 2 years ago