hardenedvault / ved-ebpfView external linksLinks
VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆168Sep 7, 2024Updated last year
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below
Sorting:
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,937Apr 7, 2024Updated last year
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- ☆15Apr 28, 2023Updated 2 years ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆92Sep 21, 2025Updated 4 months ago
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆680Jul 7, 2024Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Aug 20, 2025Updated 5 months ago
- ☆91Dec 5, 2025Updated 2 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆72Nov 20, 2023Updated 2 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,659Oct 19, 2023Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆36Oct 26, 2025Updated 3 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- ebpfkit is a rootkit powered by eBPF☆831Feb 28, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆119Dec 15, 2025Updated last month
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆215Mar 29, 2024Updated last year
- ☆23Mar 4, 2025Updated 11 months ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago