andrewstucki / bpf-lsm
Example BPF program with LSM hooks
☆31Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for bpf-lsm
- Trace deep kernel events through eBPF and lsm hooks☆34Updated 3 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Updated 2 years ago
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆101Updated 10 months ago
- Fork from git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git (unstable and force pushed!)☆20Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆137Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆123Updated last year
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆40Updated 4 years ago
- CO-RE code for the Netdata eBPF plugin.☆11Updated 3 weeks ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆56Updated 2 years ago
- Examples of using BPF ring buffer APIs☆121Updated 4 years ago
- A file system events notifier based on eBPF☆57Updated last year
- Sample ebpf programs to analyze☆91Updated this week
- The BTFhub Archive repository provides BTF files for those published kernels that lack native support for embedded BTF, thereby enhancing…☆95Updated this week
- ☆43Updated 2 years ago
- ☆14Updated last year
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆113Updated last year
- Source-code based coverage for eBPF programs actually running in the Linux kernel☆128Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆164Updated last year
- ebpH (Extended BPF Process Homeostasis) monitors process behavior on your system to establish normal behavioral patterns. ebpH reports an…☆40Updated last year
- ☆84Updated 4 months ago
- eBPF - extended Berkeley Packet Filter tooling☆122Updated 2 years ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆14Updated 3 years ago
- Example program using eBPF to log data being based in using shell pipes☆40Updated 3 years ago
- eBPF based syscalls, files and network events tracing framework☆90Updated 4 years ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆64Updated this week
- Get live information about applications that make network requests (based on eBPF)☆45Updated 3 months ago
- An eBPF program debugger☆197Updated 2 years ago
- monitor and protect SSH sessions with eBPF☆65Updated 3 years ago
- A BPF-based syscall fault injector☆94Updated last year