evilsocket / clang-ebpf-builderLinks
A Rust crate that simplifies the integration of Rust and eBPF programs written in C.
☆20Updated 3 years ago
Alternatives and similar repositories for clang-ebpf-builder
Users that are interested in clang-ebpf-builder are comparing it to the libraries listed below
Sorting:
- egrets monitors egress☆46Updated 5 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- High performance time ordered PCAP merging utility☆23Updated 3 years ago
- ☆13Updated 4 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Tool for profiling heap usage and memory management☆27Updated 3 years ago
- Linux crash harness with runtime process instrumentation☆22Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆116Updated 2 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 8 months ago
- io_uring based network scanner written in Rust☆45Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A DNS library for Rust.☆23Updated 2 months ago
- Fuzzing compression libraries☆19Updated 9 years ago
- Various utilities useful for developers writing BPF tools☆30Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- ☆27Updated 6 years ago
- ☆17Updated 6 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Updated 6 months ago
- a friendly wrapper around ptrace☆132Updated 3 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Secure Boot Definition Languag☆10Updated 3 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago