johnjohnsp1 / capsule8
Capsule8: open-source cloud-native behavioral security monitoring
☆30Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for capsule8
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆20Updated 5 months ago
- Docker Secure Computing Profile Generator☆47Updated 3 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆113Updated last year
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆53Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆27Updated 2 years ago
- SysFlow documentation and issues tracker☆45Updated last month
- Trace deep kernel events through eBPF and lsm hooks☆34Updated 3 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆123Updated last year
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆64Updated 2 weeks ago
- teler Resource Collections☆36Updated this week
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆97Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 2 years ago
- ☆173Updated 3 weeks ago
- Example program using eBPF to log data being based in using shell pipes☆40Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Example BPF program with LSM hooks☆31Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆53Updated 2 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆40Updated 4 years ago
- Linux endpoint events for BPF enabled systems☆24Updated last year
- ptrace-based event producer for udig☆67Updated 2 years ago
- Proof of concept for CVE-2020-15257 in containerd.☆17Updated 3 years ago
- A repository to store Rad Fingerprinting data.☆23Updated 3 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- Community-based CybergON-powered Suricata rules☆12Updated 2 years ago