VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆170Sep 7, 2024Updated last year
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vault Exploit Defense☆128Sep 7, 2024Updated last year
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,956Apr 7, 2024Updated 2 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- A sample PoC for container-aware exec events for osquery☆27Feb 15, 2024Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆685Jul 7, 2024Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Aug 20, 2025Updated 7 months ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- ☆92Dec 5, 2025Updated 4 months ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dectect syscall hooking using eBPF☆169Apr 28, 2023Updated 2 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆21Sep 16, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ebpfkit is a rootkit powered by eBPF☆841Feb 28, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆75Nov 27, 2024Updated last year
- Inspect SSL/TLS traffic using eBPF☆20Oct 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- proof-of-concept example of using eBPF to Monitor for eBPF Map tampering☆24May 5, 2021Updated 4 years ago
- Bootkits☆20Sep 13, 2023Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,660Oct 19, 2023Updated 2 years ago
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆111Aug 11, 2025Updated 8 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆62Mar 12, 2025Updated last year
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆234Jun 2, 2024Updated last year
- A Linux Host-based Intrusion Detection System based on eBPF.☆457Dec 20, 2023Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆73Nov 20, 2023Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90May 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆106Dec 8, 2025Updated 4 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆140Feb 28, 2023Updated 3 years ago
- A C++ library that parses debug information encoded in BTF format☆29Apr 11, 2023Updated 3 years ago