microsoft / SysinternalsEBPF
The Linux port of the Sysinternals Sysmon tool.
☆256Updated last month
Alternatives and similar repositories for SysinternalsEBPF:
Users that are interested in SysinternalsEBPF are comparing it to the libraries listed below
- Red Canary's eBPF Sensor☆102Updated 8 months ago
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆116Updated 5 months ago
- Anything Sysmon related from the MSTIC R&D team☆150Updated 9 months ago
- MSR Project Freta☆76Updated 8 months ago
- Windows Registry Knowledge Base☆173Updated 5 months ago
- Sysmon for Linux☆1,842Updated this week
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆154Updated 6 months ago
- Dectect syscall hooking using eBPF☆149Updated last year
- Linux Kernel Runtime Integrity with eBPF☆173Updated last year
- Event Tracing For Windows (ETW) Resources☆365Updated 5 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆127Updated 2 years ago
- Library and tools to access the Windows XML Event Log (EVTX) format☆197Updated 5 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆403Updated 2 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223Updated 3 years ago
- A wireshark plugin to instrument ETW☆552Updated 3 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- This repository contains the demo material built on top of ebpf-for-windows platform.☆39Updated 6 months ago
- ☆86Updated 8 months ago
- Signature engine for all your logs☆166Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆146Updated 3 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆245Updated 2 years ago
- The common parts of the Sysinternals Sysmon tool shared between the Windows and Linux versions.☆62Updated 2 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆568Updated this week
- View ETW Provider manifest☆465Updated 4 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆80Updated 5 months ago
- ☆498Updated 3 months ago
- Security testing tools for Windows sandboxing technologies☆162Updated last year
- A DTrace on Windows Reimplementation☆341Updated last month
- Detection in the form of Yara, Snort and ClamAV signatures.☆220Updated 4 months ago
- AVML - Acquire Volatile Memory for Linux☆923Updated this week