Lind-Project / safeposix-rust
Rust implementation of SafePOSIX
☆13Updated this week
Alternatives and similar repositories for safeposix-rust:
Users that are interested in safeposix-rust are comparing it to the libraries listed below
- Lind: Secure Lightweight Adaptive Isolation☆28Updated 4 months ago
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆21Updated last year
- Linux Kernel Runtime Integrity with eBPF☆173Updated last year
- Linux Security Hardening for Confidential Compute☆66Updated 4 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 3 months ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆64Updated 2 years ago
- ☆12Updated 3 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆57Updated 2 years ago
- ☆27Updated 2 years ago
- eBPF verifier based on abstract interpretation☆404Updated last week
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆28Updated 9 months ago
- ☆21Updated this week
- agent for handling seccomp descriptors for container runtimes☆44Updated last year
- ☆435Updated 6 months ago
- Example BPF program with LSM hooks☆33Updated 3 years ago
- An eBPF program debugger☆200Updated 2 years ago
- ☆35Updated 3 years ago
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆101Updated last year
- ☆19Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 4 months ago
- Source-code based coverage for eBPF programs actually running in the Linux kernel☆130Updated 2 weeks ago
- Attestation and Secret Delivery Components☆81Updated this week
- ☆23Updated 3 months ago
- ☆87Updated 4 months ago
- Explore a live Linux kernel's memory using GDB☆114Updated 2 years ago
- Adelie's source code☆11Updated 2 years ago
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆59Updated 2 months ago
- POC for Phantom Attack☆79Updated 2 years ago
- ☆39Updated this week