eBPF - extended Berkeley Packet Filter tooling
☆134Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for ebpf
Users that are interested in ebpf are comparing it to the libraries listed below
Sorting:
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated 3 weeks ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Mar 22, 2024Updated last year
- ☆14Jun 25, 2019Updated 6 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Sep 3, 2021Updated 4 years ago
- Go heap dump viewer with object graphs. (Works with Go 1.21)☆26Aug 13, 2024Updated last year
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated last month
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- A load generator for Salt☆14Mar 2, 2022Updated 4 years ago
- GitHub actions and packages for building Grafana☆12Updated this week
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- String formatting in Rust without memory allocator☆17Dec 2, 2024Updated last year
- GraLLAMA panel for LLAMA data☆16Mar 28, 2025Updated 11 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Presentation repository around making an API that retrieves large amounts of geospatial data quickly☆12Mar 7, 2023Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- A simple library to share workloads to a group of workers with one leader at any time. Built on top of Redis.☆16Feb 7, 2025Updated last year