eBPF - extended Berkeley Packet Filter tooling
☆134Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for ebpf
Users that are interested in ebpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- ☆14Nov 1, 2016Updated 9 years ago
- String formatting in Rust without memory allocator☆17Dec 2, 2024Updated last year
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated last month
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- GitHub actions and packages for building Grafana☆12Mar 9, 2026Updated 2 weeks ago
- An eBPF playground☆210Dec 12, 2023Updated 2 years ago
- tcpriv: Access Control Architecture Separating Privilege Transparently via TCP Connection Based on Process Information☆17Aug 26, 2020Updated 5 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Go heap dump viewer with object graphs. (Works with Go 1.21)☆26Aug 13, 2024Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- A K8s ClusterIP HTTP monitoring library based on eBPF☆19May 23, 2021Updated 4 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- AI/ML made easy☆10Feb 10, 2020Updated 6 years ago
- Improving reliability since 2016☆44Feb 15, 2017Updated 9 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- A load generator for Salt☆14Mar 2, 2022Updated 4 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- Security contract types☆60Oct 4, 2022Updated 3 years ago
- ☆16Oct 3, 2018Updated 7 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆69Dec 3, 2025Updated 3 months ago
- Proof of concept for CVE-2020-15257 in containerd.☆18Jan 12, 2021Updated 5 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- [PoC] A socket-based tracing system for discovering network service dependencies. (renamed from transtracer)☆56Mar 6, 2026Updated 2 weeks ago