hardenedvault / vedLinks
Vault Exploit Defense
☆128Updated 10 months ago
Alternatives and similar repositories for ved
Users that are interested in ved are comparing it to the libraries listed below
Sorting:
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆133Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆180Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆163Updated 10 months ago
- POC for Phantom Attack☆83Updated 2 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆149Updated 3 years ago
- Dectect syscall hooking using eBPF☆159Updated 2 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 3 years ago
- Check linux sources dump for known CVEs.☆134Updated 3 months ago
- ☆304Updated 2 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Updated 3 months ago
- Example BPF program with LSM hooks☆33Updated 4 years ago
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- ☆130Updated 2 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- An eBPF playground☆206Updated last year
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- ☆95Updated 3 years ago
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 3 years ago
- A binary hardening system☆109Updated last year
- ☆98Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆66Updated 3 weeks ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- A system call interception tool☆57Updated 7 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- some kernel exploit challenges and cve analysis☆26Updated 6 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago