hardenedvault / ved-ebpfLinks
VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF
☆163Updated 10 months ago
Alternatives and similar repositories for ved-ebpf
Users that are interested in ved-ebpf are comparing it to the libraries listed below
Sorting:
- Linux Kernel Runtime Integrity with eBPF☆180Updated last year
- Dectect syscall hooking using eBPF☆159Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆133Updated 2 years ago
- An eBPF playground☆206Updated last year
- Vault Exploit Defense☆128Updated 10 months ago
- ☆89Updated last year
- POC for Phantom Attack☆83Updated 2 years ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆49Updated 4 months ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆24Updated last year
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- Red Canary's eBPF Sensor☆108Updated last month
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ☆69Updated 8 months ago
- Linpmem is a linux memory acquisition tool☆87Updated last month
- eBPF hacks☆188Updated 7 months ago
- eBPF Memory Dump Tool☆82Updated last month
- ☆130Updated 2 months ago
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 3 years ago
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆28Updated 10 months ago
- ☆304Updated 2 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆257Updated last year
- Kernel Read Write Execute☆45Updated 6 months ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆66Updated 8 months ago
- Linux rootkit for educational purposes☆33Updated last year
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Slides & Hands-on for the reverse engineering workshop☆181Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated last year