hardenedvault / ved-ebpfLinks
VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆158Updated 9 months ago
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below
Sorting:
- Linux Kernel Runtime Integrity with eBPF☆179Updated last year
- Dectect syscall hooking using eBPF☆154Updated 2 years ago
- An eBPF playground☆206Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆132Updated 2 years ago
- POC for Phantom Attack☆83Updated 2 years ago
- ☆88Updated 11 months ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆147Updated 3 years ago
- Red Canary's eBPF Sensor☆107Updated last week
- eBPF hacks☆187Updated 6 months ago
- Linpmem is a linux memory acquisition tool☆84Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆48Updated 3 months ago
- eBPF Memory Dump Tool☆73Updated this week
- Vault Exploit Defense☆125Updated 9 months ago
- ☆130Updated last month
- Slides & Hands-on for the reverse engineering workshop☆179Updated 2 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆23Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆115Updated 3 weeks ago
- ☆59Updated 7 months ago
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 2 years ago
- ☆302Updated last year
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆254Updated last year
- ☆102Updated 2 years ago
- A simple ptrace-less shared library injector for x64 Linux☆261Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆618Updated 11 months ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆75Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago
- A tool for firmware cartography☆154Updated last week
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago