A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29
☆685Jul 7, 2024Updated last year
Alternatives and similar repositories for bad-bpf
Users that are interested in bad-bpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ebpfkit is a rootkit powered by eBPF☆839Feb 28, 2023Updated 3 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,949Apr 7, 2024Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆140Feb 28, 2023Updated 3 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,665Oct 19, 2023Updated 2 years ago
- A Linux Host-based Intrusion Detection System based on eBPF.☆458Dec 20, 2023Updated 2 years ago
- Collection of Linux eBPF slides/documents.☆982Nov 15, 2023Updated 2 years ago
- Scaffolding for BPF application development with libbpf and BPF CO-RE☆1,452Feb 27, 2026Updated 3 weeks ago
- ☆28Nov 24, 2021Updated 4 years ago
- Linux Runtime Security and Forensics using eBPF☆4,427Mar 16, 2026Updated last week
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- Automated upstream mirror for libbpf stand-alone build.☆2,656Mar 16, 2026Updated last week
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆305Nov 30, 2024Updated last year
- A golang ebpf libary based on cilium/ebpf and datadog/ebpf.☆348May 18, 2025Updated 10 months ago
- A curated list of awesome projects related to eBPF.☆4,954Mar 11, 2026Updated last week
- Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and ser…☆2,606Mar 9, 2026Updated 2 weeks ago
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 9 months ago
- Dectect syscall hooking using eBPF☆169Apr 28, 2023Updated 2 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- ☆85Jan 23, 2022Updated 4 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆170Sep 7, 2024Updated last year
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆579Jun 7, 2022Updated 3 years ago
- Red-Team LKM☆636Dec 16, 2025Updated 3 months ago
- BTFhub, in collaboration with the BTFhub Archive repository, supplies BTF files for all published kernels that lack native support for em…☆471Mar 11, 2026Updated last week
- eBPF Developer Tutorial: Learning eBPF Step by Step with Examples☆3,997Mar 11, 2026Updated last week
- eBPF-based Security Observability and Runtime Enforcement☆4,487Updated this week
- Linux Kernel Hacking☆750Apr 10, 2024Updated last year
- eBPF verifier based on abstract interpretation☆457Updated this week
- Source-code based coverage for eBPF programs actually running in the Linux kernel☆137Feb 6, 2025Updated last year
- Red Canary's eBPF Sensor☆113Updated this week
- Generate eBPF programs and tracing with ChatGPT☆271Mar 7, 2026Updated 2 weeks ago
- bpf 学习仓库☆1,499Apr 30, 2022Updated 3 years ago
- awesome-linux-rootkits☆2,041Feb 15, 2026Updated last month
- ebpf-go is a pure-Go library to read, modify and load eBPF programs and attach them to various hooks in the Linux kernel.☆7,587Mar 11, 2026Updated last week
- Examples for aquasecurity/libbpfgo and cilium/ebpf☆189Feb 1, 2026Updated last month
- Credentials Dumper for Linux using eBPF☆1,157Sep 9, 2024Updated last year
- Linux技术栈☆908Feb 27, 2026Updated 3 weeks ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- Utilities and example programs for use with XDP☆848Feb 27, 2026Updated 3 weeks ago
- Exploit tool implemented using ebpf.☆212Jun 4, 2024Updated last year