A collection of bypasses and exploits for eBPF-based cloud security.
☆26Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for ebpf-attacks
Users that are interested in ebpf-attacks are comparing it to the libraries listed below
Sorting:
- Jibril: A performant and low impact Linux runtime security tool agent.☆14May 25, 2025Updated 9 months ago
- Hide your tcp connection!!!☆12Apr 8, 2020Updated 5 years ago
- Proactive security monitoring and threat detection in CI/CD☆15May 5, 2025Updated 9 months ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- A Linux kernel module which can be used to allocate memory from the Contiguous Memory Allocator☆16Oct 31, 2017Updated 8 years ago
- Run ebpf programs in docker (e.g., bpftrace)☆27Oct 6, 2022Updated 3 years ago
- ☆30Dec 3, 2022Updated 3 years ago
- proof-of-concept example of using eBPF to Monitor for eBPF Map tampering☆23May 5, 2021Updated 4 years ago
- Simulations and figures for 5G NR radio resource properties planning. Built for educational purposes.☆35Jun 23, 2025Updated 8 months ago
- eBPF based sector level disk replication tool for disaster recovery purpose☆33Nov 24, 2025Updated 3 months ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- to study xilinx fpga using Zybo Z7-20 board☆14Mar 13, 2024Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Jun 12, 2024Updated last year
- ☆12Aug 17, 2022Updated 3 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- UTrace is a tracing utility that leverages eBPF to trace both user space and kernel space functions☆50Jan 18, 2022Updated 4 years ago
- ☆107Jan 22, 2025Updated last year
- In this quick course, you will learn the basics about implementing Lottie animations across your web and mobile apps.☆13Jun 23, 2022Updated 3 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- k8s.gcr.io/echoserver fork☆13Sep 7, 2021Updated 4 years ago
- Accelerating the regular expression matching on FPGA for applications in Networking and Bioinformatics.☆13Nov 24, 2017Updated 8 years ago
- A tiny load balancer, implemented by XDP.☆12Nov 25, 2024Updated last year
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- FIFO implementation with different clock domains for read and write.☆14Aug 17, 2021Updated 4 years ago
- ONF's mirror of https://gitlab.eurecom.fr/oai/openairinterface5g☆14Feb 6, 2026Updated 3 weeks ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- Artifact evaluation of paper: MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation☆49Apr 22, 2025Updated 10 months ago
- ☆12Mar 31, 2021Updated 4 years ago
- FIR Filter in Verilog☆15Nov 17, 2019Updated 6 years ago
- ☆12Feb 9, 2025Updated last year
- ☆10Aug 9, 2024Updated last year
- HTTP middleware for OpenFaaS☆13Apr 18, 2025Updated 10 months ago
- Helm charts for SD-RAN☆10Feb 24, 2026Updated last week
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 3 years ago
- ☆14Jun 27, 2024Updated last year
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- 5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices☆16Apr 28, 2022Updated 3 years ago