pathtofile / bpf-hookdetect
Dectect syscall hooking using eBPF
☆151Updated last year
Alternatives and similar repositories for bpf-hookdetect:
Users that are interested in bpf-hookdetect are comparing it to the libraries listed below
- Linux Kernel Runtime Integrity with eBPF☆174Updated last year
- POC for Phantom Attack☆82Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆129Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆156Updated 7 months ago
- An IDA processor for eBPF bytecode☆47Updated 3 years ago
- An IDA processor for eBPF bytecode☆62Updated 5 months ago
- An eBPF playground☆205Updated last year
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆89Updated 9 months ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆147Updated 3 years ago
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- ☆86Updated 9 months ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- The demo of hidden process and ko module☆20Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated 11 months ago
- Linux EDR written in Golang and based on eBPF.☆236Updated 2 years ago
- Vault Exploit Defense☆125Updated 7 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆39Updated last month
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 3 years ago
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆62Updated 3 weeks ago
- ☆136Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆28Updated 4 years ago
- ☆49Updated 5 months ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆36Updated 2 years ago
- IDA SIG files for multiarch uClibc library☆37Updated 6 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago