Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)
☆305Nov 30, 2024Updated last year
Alternatives and similar repositories for Hades
Users that are interested in Hades are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Linux Host-based Intrusion Detection System based on eBPF.☆458Dec 20, 2023Updated 2 years ago
- Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and ser…☆2,609Mar 9, 2026Updated 2 weeks ago
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆28Dec 14, 2024Updated last year
- Linux EDR written in Golang and based on eBPF.☆244May 24, 2022Updated 3 years ago
- GO开发而成,用于NIDS HIDS 分析的规则引擎,使用WorkerPool 高性能检测,支持多字段 "和" "或" 检测, 支持频率检测☆76Feb 8, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hades HIDS/HIPS for Windows☆309Oct 10, 2025Updated 5 months ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆602Apr 1, 2021Updated 4 years ago
- vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that…☆451Mar 20, 2026Updated last week
- ebpfkit is a rootkit powered by eBPF☆840Feb 28, 2023Updated 3 years ago
- Elkeid HUB is a rule/event processing engine maintained by the Elkeid Team that supports streaming/offline (not yet supported by the comm…☆103May 8, 2023Updated 2 years ago
- An awesome reverse engine for xray poc. | 一个自动化根据 xray poc 生成对应靶站的工具☆424Mar 22, 2023Updated 3 years ago
- Hades is an cross-platform HIDS with kernel-space data collection.☆49May 29, 2023Updated 2 years ago
- 安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports mult…☆1,271Oct 17, 2023Updated 2 years ago
- A system that may trick hackers. 针对黑客的拟态欺骗系统。☆455Nov 20, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆685Jul 7, 2024Updated last year
- A golang ebpf libary based on cilium/ebpf and datadog/ebpf.☆348May 18, 2025Updated 10 months ago
- Inject ELF into remote process☆151Oct 20, 2023Updated 2 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,587Feb 23, 2026Updated last month
- ZKar is a Java serialization protocol analysis tool implement in Go.☆650Feb 15, 2025Updated last year
- agent 部分使用go 开发而成,采用插件模式开发而成,配置部分以及agent存活使用etcd。☆20Aug 2, 2021Updated 4 years ago
- 通过Linux netlink NETLINK_CONNECTOR 协议实时进行监控本机进程情况。☆13Oct 11, 2019Updated 6 years ago
- [WIP] 整理过去我和K8s、容器、虚拟化相关的分享 🧐☆3,153Nov 6, 2025Updated 4 months ago
- 检测绝大部分所谓的内存免杀马☆734Sep 15, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CloudWalker Platform☆676Dec 14, 2022Updated 3 years ago
- 处于原型阶段☆20Nov 30, 2021Updated 4 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,266Jul 8, 2023Updated 2 years ago
- Windows CVE主防(HIPS/HIDS)☆58Apr 29, 2021Updated 4 years ago
- 清除Go编译时自带的信息☆854Jul 20, 2022Updated 3 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆715Aug 3, 2021Updated 4 years ago
- 《云原生安全:攻防实践与体系构建》资料仓库☆779Feb 19, 2023Updated 3 years ago
- 傻瓜式漏洞PoC测试框架☆1,442Oct 30, 2023Updated 2 years ago
- Java Agent is a Java application probe of DongTai IAST, which collects method invocation data during runtime of Java application by dynam…☆697Dec 25, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 主流供应商的一些攻击性漏洞汇总☆808Nov 8, 2021Updated 4 years ago
- 一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。☆931Dec 24, 2023Updated 2 years ago
- Security-Scenes-Feature-Engineering-Toolkit, Continuous Integration.一款安全数据特征化工具☆60May 22, 2023Updated 2 years ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- QNSM is network security monitoring framework based on DPDK.☆527Sep 27, 2021Updated 4 years ago
- Static code auditing system☆468Jan 8, 2021Updated 5 years ago
- 超硬核!使用图数据技术发现软件漏洞☆185Sep 1, 2021Updated 4 years ago