Build custom Docker seccomp profiles for containers by finding syscalls it uses.
☆92Oct 19, 2025Updated 5 months ago
Alternatives and similar repositories for syscall2seccomp
Users that are interested in syscall2seccomp are comparing it to the libraries listed below
Sorting:
- Docker Secure Computing Profile Generator☆49Oct 22, 2021Updated 4 years ago
- Yet Another Network Simulator☆25Jan 20, 2017Updated 9 years ago
- ☆13Jul 25, 2022Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Jun 16, 2020Updated 5 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Jun 30, 2022Updated 3 years ago
- agent for handling seccomp descriptors for container runtimes☆47Feb 1, 2024Updated 2 years ago
- Sysdig agent Operator configure Sysdig platform in your Kubernetes cluster☆15Nov 2, 2023Updated 2 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- A simple Kubernetes configuration modifier.☆48Dec 5, 2019Updated 6 years ago
- Sample Terraform templates ready for env0 integration☆28Mar 12, 2026Updated last week
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆106Jan 11, 2024Updated 2 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Manage AppAmormor profiles for Kubernetes cluster☆42Oct 11, 2023Updated 2 years ago
- Deprecated☆27Feb 11, 2019Updated 7 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- Container Security Verification Standard☆36Mar 28, 2019Updated 6 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- Playground for testing feedback☆16Aug 12, 2020Updated 5 years ago
- Alcide Kubernetes Audit Log Analyzer - Alcide kAudit☆35Jul 8, 2021Updated 4 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Oct 29, 2020Updated 5 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆27Feb 19, 2026Updated last month
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- My own collection of Frida scripts and tricks☆69May 28, 2021Updated 4 years ago
- This repository provides a Terraform implementation that deploys an Amazon EKS cluster in a private VPC and deploys Windows and Linux wor…☆10Feb 23, 2022Updated 4 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆115Feb 9, 2026Updated last month
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- A Zygisk hooking module☆13Jan 10, 2023Updated 3 years ago
- Help building an adaptive and fine-grained pod security policy☆328Oct 11, 2023Updated 2 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- ☆29Jan 31, 2025Updated last year
- Berth use Docker containers to build packages for you, based on a YAML configuration file.☆11May 5, 2017Updated 8 years ago
- A binary ninja plugin that finds format string vulnerabilities☆25Sep 29, 2020Updated 5 years ago
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago