p- / socket-connect-bpf
Get live information about applications that make network requests (based on eBPF)
☆49Updated 2 months ago
Alternatives and similar repositories for socket-connect-bpf:
Users that are interested in socket-connect-bpf are comparing it to the libraries listed below
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆147Updated 3 years ago
- Example BPF program with LSM hooks☆33Updated 4 years ago
- The BTFhub Archive repository provides BTF files for those published kernels that lack native support for embedded BTF, thereby enhancing…☆107Updated last week
- Linux Kernel Runtime Integrity with eBPF☆174Updated last year
- A collection of BPF examples☆39Updated 4 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆129Updated 2 years ago
- An eBPF playground☆206Updated last year
- Fork from git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git (unstable and force pushed!)☆20Updated last year
- ☆86Updated 9 months ago
- An eBPF program debugger☆204Updated 2 years ago
- Examples of using BPF ring buffer APIs☆125Updated 4 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆156Updated 7 months ago
- A file system events notifier based on eBPF☆66Updated 2 years ago
- Dectect syscall hooking using eBPF☆151Updated last year
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆102Updated last year
- eBPF - extended Berkeley Packet Filter tooling☆123Updated 2 years ago
- eBPF programs without a libbcc dependency☆59Updated last year
- This manager helps handle the life cycle of your eBPF programs☆133Updated last week
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆43Updated 4 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Updated 3 years ago
- CO-RE code for the Netdata eBPF plugin.☆14Updated 5 months ago
- monitor and protect SSH sessions with eBPF☆68Updated 3 years ago
- Linux endpoint events for BPF enabled systems☆24Updated 2 years ago
- POC for Phantom Attack☆82Updated 2 years ago
- ☆28Updated 3 years ago
- Learning eBPF from zero to hero☆37Updated last year
- eBPF based syscalls, files and network events tracing framework☆92Updated 4 years ago
- Sample ebpf programs to analyze☆91Updated 4 months ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆598Updated 9 months ago