Vali-Cyber / ebpf-attacksLinks
A collection of bypasses and exploits for eBPF-based cloud security.
☆25Updated last year
Alternatives and similar repositories for ebpf-attacks
Users that are interested in ebpf-attacks are comparing it to the libraries listed below
Sorting:
- ☆89Updated last month
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆71Updated last year
- Red Canary's eBPF Sensor☆112Updated 7 months ago
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- Publications from the eBPF foundation☆28Updated last month
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- This tool have the power to hide any PID/directory in the Linux kernel☆30Updated last year
- Example BPF program with LSM hooks☆34Updated 4 years ago
- Vault Exploit Defense☆127Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- An eBPF playground☆210Updated 2 years ago
- eBPF hacks☆194Updated last year
- eBPF Memory Dump Tool☆97Updated 4 months ago
- Disable SSL certificate verification for all binaries that use libssl☆48Updated 3 years ago
- ☆23Updated 3 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- POC for Phantom Attack☆89Updated 3 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 4 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆137Updated 3 years ago
- Userland exec PoC to be used as attack vector technique☆93Updated 2 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- io_uring based rootkit☆246Updated 8 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆56Updated 9 months ago