Vault Exploit Defense
☆127Sep 7, 2024Updated last year
Alternatives and similar repositories for ved
Users that are interested in ved are comparing it to the libraries listed below
Sorting:
- Linux Kernel Runtime Guard☆575Jan 30, 2026Updated last month
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- ☆372Oct 30, 2025Updated 4 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Sep 7, 2024Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- Fork from git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git (unstable and force pushed!)☆22Jun 15, 2023Updated 2 years ago
- libsinsp, libscap, the kernel module driver, and the eBPF driver sources☆302Updated this week
- Linux EDR written in Golang and based on eBPF.☆243May 24, 2022Updated 3 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- ☆28Nov 24, 2021Updated 4 years ago
- Alcatraz project for Black Hat USA 2021☆78Aug 5, 2021Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,279Jan 29, 2026Updated last month
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆85Jan 20, 2025Updated last year
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- Recursive MMIO VM Escape PoC☆171May 13, 2022Updated 3 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆85Aug 2, 2021Updated 4 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Jun 7, 2021Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Jul 21, 2022Updated 3 years ago
- Small visualizator for PE files☆70Sep 20, 2023Updated 2 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,945Apr 7, 2024Updated last year
- Elastic's eBPF☆73Jan 27, 2026Updated last month
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- A Linux Host-based Intrusion Detection System based on eBPF.☆457Dec 20, 2023Updated 2 years ago
- Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and ser…☆2,578Updated this week
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- CVE-2022-0995 exploit☆500Mar 27, 2022Updated 3 years ago
- ebpfkit is a rootkit powered by eBPF☆838Feb 28, 2023Updated 3 years ago
- To store some CTF_reverse_bins and scripts☆11Nov 17, 2019Updated 6 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago