containerscrew / rootisnakedLinks
Simple root privilege escalation detection using eBPF π
β35Updated last month
Alternatives and similar repositories for rootisnaked
Users that are interested in rootisnaked are comparing it to the libraries listed below
Sorting:
- β85Updated 2 weeks ago
- Publications from the eBPF foundationβ28Updated 2 months ago
- β89Updated last year
- Adversary emulation for EDR/SIEM testing (macOS/Linux)β52Updated last month
- β27Updated 6 months ago
- β13Updated 9 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetesβ73Updated 7 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ Xβ¦β53Updated 2 months ago
- egrets monitors egressβ46Updated 5 years ago
- β89Updated last week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).β30Updated 8 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.β74Updated 2 years ago
- Kernel-based Process Monitoring on Linux Endpoints for File System, TCP and UDP Networking Events and optionally DNS, HTTP and SYSLOG Appβ¦β70Updated 7 months ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes clusterβ37Updated 3 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.β24Updated last year
- Universal Profiling as a desktop appβ93Updated this week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,β¦β64Updated 2 months ago
- eBPF Memory Dump Toolβ90Updated 2 months ago
- K8s API Honeypot with Active Defense Capabilitiesβ42Updated last year
- Automated testing, generation & manipulation of #osquery packsβ73Updated last year
- Kubernetes offensive framework built in eBPFβ39Updated 2 years ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko geneβ¦β103Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.β25Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.β23Updated last year
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Updated last year
- β63Updated 2 years ago
- Open Source eBPF Malware Analysis Frameworkβ53Updated last year
- proof-of-concept example of using eBPF to Monitor for eBPF Map tamperingβ22Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull imagesβ37Updated 3 weeks ago
- β74Updated 6 months ago