microsoft / SysinternalsEBPFLinks
The Linux port of the Sysinternals Sysmon tool.
☆278Updated 2 months ago
Alternatives and similar repositories for SysinternalsEBPF
Users that are interested in SysinternalsEBPF are comparing it to the libraries listed below
Sorting:
- Red Canary's eBPF Sensor☆112Updated 6 months ago
- This repository contains the demo material built on top of ebpf-for-windows platform.☆46Updated last year
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆140Updated last year
- Windows Registry Knowledge Base☆189Updated last week
- A wireshark plugin to instrument ETW☆575Updated 3 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- Detection in the form of Yara, Snort and ClamAV signatures.☆241Updated last year
- Linpmem is a linux memory acquisition tool☆94Updated 5 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆138Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆183Updated 2 years ago
- Sysmon for Linux☆2,022Updated 5 months ago
- ☆89Updated this week
- Dectect syscall hooking using eBPF☆166Updated 2 years ago
- An eBPF playground☆210Updated last year
- Anything Sysmon related from the MSTIC R&D team☆155Updated last year
- Security testing tools for Windows sandboxing technologies☆178Updated 7 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- View ETW Provider manifest☆550Updated last year
- MSR Project Freta☆77Updated last year
- Library and tools to access the Windows XML Event Log (EVTX) format☆219Updated last week
- Vault Exploit Defense☆127Updated last year
- The common parts of the Sysinternals Sysmon tool shared between the Windows and Linux versions.☆65Updated 10 months ago
- A DTrace on Windows Reimplementation☆366Updated 2 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 7 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆143Updated 2 months ago
- capemon: CAPE's monitor☆142Updated this week
- Symbol hash for ELF files☆111Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆117Updated this week
- Community modules for CAPE Sandbox☆107Updated 2 weeks ago
- Elastic Security Labs releases☆81Updated 2 weeks ago