An eBPF detection program for CVE-2022-0847
☆29Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for dirtypipe-ebpf_detection
Users that are interested in dirtypipe-ebpf_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- Kubescape eBPF agent 🥷🏻☆31Apr 9, 2026Updated last week
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- ☆18Nov 17, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 9 months ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆27Aug 5, 2017Updated 8 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- ☆13Jan 30, 2025Updated last year
- monitor and protect SSH sessions with eBPF☆73Jul 2, 2021Updated 4 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- Powershell/Javascript deobfuscator based on tree-sitter☆93Updated this week
- ☆17Mar 22, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 5 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- 渗透测试常规操作记录☆18May 31, 2023Updated 2 years ago
- Waffle is a library for integrating a Web Application Firewall (WAF) into Go applications.☆18Updated this week
- ☆26Jun 11, 2018Updated 7 years ago
- Making Type Info Library (TIL) file for Apache modules☆58Mar 25, 2021Updated 5 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆16Jul 24, 2021Updated 4 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- Source code of paper "EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications"☆16May 14, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆22Updated this week
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- Single Master - Multi Worker K8S cluster for learning and development☆15Jul 6, 2020Updated 5 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 11 months ago
- The kernel tracer that attaches eBPF probes to containers for capturing TLS traffic☆38Feb 8, 2026Updated 2 months ago
- ☆13Jul 9, 2024Updated last year
- k8s.gcr.io/echoserver fork☆13Sep 7, 2021Updated 4 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 11 years ago
- Userspace eBPF Runtime Benchmarking Test Suite and Results☆16Apr 9, 2026Updated last week
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆111Dec 3, 2025Updated 4 months ago
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆70Oct 7, 2023Updated 2 years ago
- Web shell generation tool written in go☆12Feb 28, 2023Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago