ait-aecid / rootkit-detection-ebpf-time-traceLinks
Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.
☆28Updated 4 months ago
Alternatives and similar repositories for rootkit-detection-ebpf-time-trace
Users that are interested in rootkit-detection-ebpf-time-trace are comparing it to the libraries listed below
Sorting:
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Malware Analysis tools☆26Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- eBPF Memory Dump Tool☆98Updated 5 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Linux BPF plugins for Volatility3☆23Updated 2 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆78Updated last week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- ☆39Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- ☆27Updated last year
- ☆16Updated last year
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Updated last year
- ☆63Updated last year
- A pcap capture analysis helper☆25Updated 2 years ago
- ☆16Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- ☆18Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆43Updated last week
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year