Lind-Project / safeposix-rust
Rust implementation of SafePOSIX
☆12Updated last month
Related projects ⓘ
Alternatives and complementary repositories for safeposix-rust
- Lind: Secure Lightweight Adaptive Isolation☆24Updated last month
- Linux Kernel Runtime Integrity with eBPF☆164Updated 11 months ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆62Updated 2 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆56Updated 2 years ago
- Linux Security Hardening for Confidential Compute☆66Updated last month
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆101Updated 10 months ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆136Updated 2 years ago
- Meeting materials☆15Updated 2 weeks ago
- Trace deep kernel events through eBPF and lsm hooks☆34Updated 3 years ago
- ☆16Updated 2 weeks ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆123Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆150Updated 2 months ago
- Confidential Containers Shim Firmware☆97Updated last month
- OCI hook to trace syscalls and generate a seccomp profile☆303Updated last week
- COCONUT-SVSM☆122Updated this week
- ☆427Updated 3 months ago
- Process-based Confidential Container Runtime☆79Updated this week
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆125Updated 9 months ago
- An eBPF program debugger☆197Updated 2 years ago
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆219Updated 5 months ago
- ✨🔐 CNCF Fuzzers☆113Updated this week
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆17Updated last month
- Sample ebpf programs to analyze☆91Updated last week
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆34Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆70Updated last year
- POC for Phantom Attack☆79Updated 2 years ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆20Updated last week
- The BTFhub Archive repository provides BTF files for those published kernels that lack native support for embedded BTF, thereby enhancing…☆95Updated this week
- A file system events notifier based on eBPF☆57Updated last year
- ☆87Updated last month