An eBPF detection program for CVE-2022-0847
☆29Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for dirtypipe-ebpf_detection
Users that are interested in dirtypipe-ebpf_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- Getting Started with eBPF☆27Nov 4, 2023Updated 2 years ago
- Kubescape eBPF agent 🥷🏻☆25Mar 19, 2026Updated last week
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Rust crate for parsing Windows user minidumps.☆41May 1, 2024Updated last year
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- ☆18Nov 17, 2020Updated 5 years ago
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 9 months ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Aug 5, 2017Updated 8 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- implement a vba interpreter in java☆21Dec 12, 2017Updated 8 years ago
- ☆17Mar 22, 2019Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Waffle is a library for integrating a Web Application Firewall (WAF) into Go applications.☆18Mar 16, 2026Updated last week
- ☆26Jun 11, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Making Type Info Library (TIL) file for Apache modules☆58Mar 25, 2021Updated 5 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- Use YARA rules on Time Travel Debugging traces☆96Jul 11, 2023Updated 2 years ago
- HTTP middleware for OpenFaaS☆13Apr 18, 2025Updated 11 months ago
- ☆22Updated this week
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- Single Master - Multi Worker K8S cluster for learning and development☆15Jul 6, 2020Updated 5 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Trace deep kernel events through eBPF and lsm hooks☆42Feb 9, 2021Updated 5 years ago
- The kernel tracer that attaches eBPF probes to containers for capturing TLS traffic☆37Feb 8, 2026Updated last month
- k8s.gcr.io/echoserver fork☆13Sep 7, 2021Updated 4 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- Userspace eBPF Runtime Benchmarking Test Suite and Results☆16Mar 20, 2026Updated last week
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 6 months ago
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago