linux kernel event log collector by ebpf
☆34Mar 6, 2024Updated last year
Alternatives and similar repositories for KellectAgent-Linux
Users that are interested in KellectAgent-Linux are comparing it to the libraries listed below
Sorting:
- windows kernel event log collect☆121Jan 9, 2026Updated last month
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- ☆20Oct 31, 2020Updated 5 years ago
- ☆25Dec 14, 2023Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆24May 15, 2023Updated 2 years ago
- ☆27Dec 10, 2021Updated 4 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- CNNVD 漏洞收集☆17Jul 18, 2023Updated 2 years ago
- TVDiag: A Task-oriented and View-invariant Failure Diagnosis Framework with Multimodal Data☆15Apr 28, 2025Updated 10 months ago
- ☆12Nov 10, 2020Updated 5 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 10 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆191Jan 6, 2026Updated last month
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆11Feb 22, 2016Updated 10 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- ☆17Mar 22, 2019Updated 6 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆16Oct 5, 2024Updated last year
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- A command line alias manager and note taking tool☆13Oct 27, 2022Updated 3 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month
- 华南师范大学编译原理课程实验——xlex生成器,通过输入正则表达式,逐步转化为NFA, DFA, 最小化DFA和C语言语法分析程序。 An interactive c++ program to construct NFA, DFA, minimized DFA a…☆11Feb 21, 2019Updated 7 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- 基于Go语言实现的微服务电商系统☆13Mar 17, 2024Updated last year
- Android Al-Khaser☆14Dec 12, 2023Updated 2 years ago
- Single Master - Multi Worker K8S cluster for learning and development☆15Jul 6, 2020Updated 5 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago