hardenedvault / ved-ebpfLinks
VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆167Updated last year
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below
Sorting:
- Dectect syscall hooking using eBPF☆167Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- An eBPF playground☆210Updated 2 years ago
- ☆89Updated last month
- POC for Phantom Attack☆89Updated 3 years ago
- Vault Exploit Defense☆127Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- Disable SSL certificate verification for all binaries that use libssl☆48Updated 3 years ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆57Updated 10 months ago
- Red Canary's eBPF Sensor☆112Updated 7 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- A collection of bypasses and exploits for eBPF-based cloud security.☆25Updated 2 years ago
- eBPF hacks☆194Updated last year
- eBPF Memory Dump Tool☆97Updated 4 months ago
- ☆133Updated 3 months ago
- ☆90Updated last year
- Linpmem is a linux memory acquisition tool☆95Updated 6 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆30Updated last year
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- ☆310Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆66Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- Userland exec PoC to be used as attack vector technique☆93Updated 2 months ago
- ASLR bypass without infoleak☆166Updated 4 years ago