jpope8 / container-escape-datasetView external linksLinks
Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.
☆15Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for container-escape-dataset
Users that are interested in container-escape-dataset are comparing it to the libraries listed below
Sorting:
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆11Sep 29, 2024Updated last year
- Android deeplink misconfiguration detector and exploitation tool☆26Updated this week
- 基于FISCO-BCOS区块链的供应链demo,使用node.js构建后端☆10Jan 28, 2021Updated 5 years ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 9 months ago
- Convert auditd logs to json format☆10Apr 3, 2019Updated 6 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- A PyGame hello-world for the Miyoo Mini☆14Jun 10, 2024Updated last year
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- A 32 bit RISC-V SoC (picorv32) on Lattice MXO2 (step fpga)☆10Jan 18, 2021Updated 5 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆109Aug 11, 2025Updated 6 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 5 years ago
- ☆12Jul 18, 2024Updated last year
- Slides of mine.☆12Apr 19, 2024Updated last year
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- 🎉🎨 Papers, CODE, Datasets for Self-Supervised Learning (SSL)☆12Feb 27, 2024Updated last year
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- Teo-ng - A Thomson TO8 Emulator☆11May 5, 2023Updated 2 years ago
- ☆17Jul 16, 2025Updated 6 months ago
- ☆17Aug 14, 2025Updated 6 months ago
- The source code from the Writing Wayland clients book https://www.gitbook.com/book/bugaevc/writing-wayland-clients☆12Aug 23, 2017Updated 8 years ago
- ☆15Jan 30, 2025Updated last year
- x86 JIT playground for documenting and exploring microarchitectural implementation details☆18Oct 15, 2025Updated 3 months ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆17Jan 16, 2026Updated 3 weeks ago
- HarfBuzz text shaping engine☆12Feb 3, 2026Updated last week
- ☆21Mar 2, 2024Updated last year
- DHG-Bench is a comprehensive benchmark for Deep Hypergraph Learning☆29Feb 3, 2026Updated last week
- ☆15Nov 3, 2022Updated 3 years ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- alfred workflow,货币数字、中文大写和英文相互转换☆10Nov 17, 2018Updated 7 years ago