p- / socket-connect-bpf
Get live information about applications that make network requests (based on eBPF)
☆49Updated 3 months ago
Alternatives and similar repositories for socket-connect-bpf
Users that are interested in socket-connect-bpf are comparing it to the libraries listed below
Sorting:
- Example BPF program with LSM hooks☆33Updated 4 years ago
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- The BTFhub Archive repository provides BTF files for those published kernels that lack native support for embedded BTF, thereby enhancing…☆112Updated this week
- bpflock - eBPF driven security for locking and auditing Linux machines☆147Updated 3 years ago
- eBPF - extended Berkeley Packet Filter tooling☆123Updated 2 years ago
- monitor and protect SSH sessions with eBPF☆69Updated 3 years ago
- An eBPF playground☆206Updated last year
- ☆88Updated 10 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆131Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆175Updated last year
- ebpf-based tcpdump☆89Updated last year
- CO-RE code for the Netdata eBPF plugin.☆14Updated 6 months ago
- An eBPF program debugger☆206Updated 2 years ago
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆102Updated last year
- A file system events notifier based on eBPF☆68Updated 2 years ago
- Examples of using BPF ring buffer APIs☆127Updated 4 years ago
- Elastic's eBPF☆68Updated last month
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Updated 3 years ago
- Sample ebpf programs to analyze☆91Updated 4 months ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆43Updated 4 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆156Updated 8 months ago
- POC for Phantom Attack☆83Updated 2 years ago
- A collection of BPF examples☆39Updated 4 years ago
- UTrace is a tracing utility that leverages eBPF to trace both user space and kernel space functions☆44Updated 3 years ago
- This manager helps handle the life cycle of your eBPF programs☆136Updated last week
- eBPF programs without a libbcc dependency☆60Updated last year
- eBPF Library for Go☆29Updated 2 weeks ago
- Red Canary's eBPF Sensor☆106Updated this week
- Vault Exploit Defense☆125Updated 8 months ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆22Updated last year