VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆170Sep 7, 2024Updated last year
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,951Apr 7, 2024Updated last year
- ☆15Apr 28, 2023Updated 2 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- A sample PoC for container-aware exec events for osquery☆26Feb 15, 2024Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆684Jul 7, 2024Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆135Aug 20, 2025Updated 7 months ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆92Sep 21, 2025Updated 6 months ago
- ☆36Oct 26, 2023Updated 2 years ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆92Dec 5, 2025Updated 3 months ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Dectect syscall hooking using eBPF☆169Apr 28, 2023Updated 2 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆21Sep 16, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ebpfkit is a rootkit powered by eBPF☆840Feb 28, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆76Nov 27, 2024Updated last year
- proof-of-concept example of using eBPF to Monitor for eBPF Map tampering☆23May 5, 2021Updated 4 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,665Oct 19, 2023Updated 2 years ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆60Mar 12, 2025Updated last year
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆111Aug 11, 2025Updated 7 months ago
- Making containers more secure with eBPF and Linux Security Modules (LSM)☆232Jun 2, 2024Updated last year
- A Linux Host-based Intrusion Detection System based on eBPF.☆458Dec 20, 2023Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆73Nov 20, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92May 12, 2022Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆244Sep 26, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆141Feb 28, 2023Updated 3 years ago