johnjohnsp1 / capsule8Links
Capsule8: open-source cloud-native behavioral security monitoring
☆33Updated 8 years ago
Alternatives and similar repositories for capsule8
Users that are interested in capsule8 are comparing it to the libraries listed below
Sorting:
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- ☆191Updated last week
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- Linux EDR written in Golang and based on eBPF.☆244Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- ☆60Updated last year
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆119Updated last month
- Vault Exploit Defense☆127Updated last year
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Linux endpoint events for BPF enabled systems☆24Updated 3 years ago
- 虚拟机带外内存监控☆14Updated 7 years ago
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆56Updated 9 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Get live information about applications that make network requests (based on eBPF)☆53Updated 4 months ago
- ☆39Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆99Updated 5 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆305Updated last year
- Red Canary's eBPF Sensor☆113Updated 7 months ago
- Kernel-Mode Rootkit Hunter☆376Updated 4 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- Resources for CloudNative security research☆32Updated 4 years ago
- utmp file dumper, written in golang. Output to json or tsv or csv.☆34Updated 2 years ago
- docker vulnerability analysis☆50Updated 9 years ago
- Example BPF program with LSM hooks☆35Updated 4 years ago
- Source code of DDG Mining Botnet tracker☆59Updated 5 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago