Lind-Project / safeposix-rustLinks
Rust implementation of SafePOSIX
☆13Updated 2 months ago
Alternatives and similar repositories for safeposix-rust
Users that are interested in safeposix-rust are comparing it to the libraries listed below
Sorting:
- Lind: Secure Lightweight Adaptive Isolation☆30Updated last month
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆65Updated 3 years ago
- Linux Security Hardening for Confidential Compute☆67Updated 10 months ago
- ☆458Updated last month
- COCONUT-SVSM☆167Updated this week
- ☆39Updated this week
- A CLI tool for creating secure by design/default source repos.☆26Updated last year
- ☆10Updated 2 years ago
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- Linux Kernel Runtime Integrity with eBPF☆180Updated last year
- Deploy the SC2 system on Kubernetes.☆9Updated 3 months ago
- eBPF verifier based on abstract interpretation☆421Updated last week
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆40Updated last week
- bpflock - eBPF driven security for locking and auditing Linux machines☆149Updated 3 years ago
- ☆40Updated last week
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆17Updated 10 months ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆132Updated last year
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆43Updated 5 years ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆67Updated 8 months ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆16Updated 3 years ago
- Confidential Containers Shim Firmware☆112Updated last month
- ☆22Updated last year
- ☆36Updated this week
- Lightweight fuzzing of a memory snapshot using KVM☆458Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆230Updated last year
- OCI hook to trace syscalls and generate a seccomp profile☆329Updated this week
- ☆34Updated last month
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆307Updated this week