microsoft / SysinternalsEBPF
The Linux port of the Sysinternals Sysmon tool.
☆260Updated last month
Alternatives and similar repositories for SysinternalsEBPF:
Users that are interested in SysinternalsEBPF are comparing it to the libraries listed below
- Red Canary's eBPF Sensor☆105Updated 10 months ago
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆119Updated 7 months ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated 11 months ago
- A wireshark plugin to instrument ETW☆557Updated 3 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆224Updated 4 years ago
- Linux Kernel Runtime Integrity with eBPF☆175Updated last year
- Windows Registry Knowledge Base☆173Updated 7 months ago
- Dectect syscall hooking using eBPF☆151Updated 2 years ago
- View ETW Provider manifest☆482Updated 6 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- Library and tools to access the Windows XML Event Log (EVTX) format☆200Updated 7 months ago
- A DTrace on Windows Reimplementation☆344Updated 3 months ago
- This repository contains the demo material built on top of ebpf-for-windows platform.☆43Updated 7 months ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆131Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆82Updated 11 months ago
- The common parts of the Sysinternals Sysmon tool shared between the Windows and Linux versions.☆63Updated 3 months ago
- ETW Python Library☆281Updated last year
- $MFT directory tree reconstruction & FILE record info☆304Updated 7 months ago
- MSR Project Freta☆77Updated 9 months ago
- Event Tracing For Windows (ETW) Resources☆379Updated 7 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆156Updated 8 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆419Updated last month
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆297Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆576Updated last month
- Detection in the form of Yara, Snort and ClamAV signatures.☆224Updated 6 months ago
- Signature engine for all your logs☆168Updated last year
- AVML - Acquire Volatile Memory for Linux☆942Updated last week
- ☆88Updated 10 months ago
- Sysmon-Like research tool for ETW☆352Updated 2 years ago