pathtofile / bpf-hookdetect
Dectect syscall hooking using eBPF
☆145Updated last year
Alternatives and similar repositories for bpf-hookdetect:
Users that are interested in bpf-hookdetect are comparing it to the libraries listed below
- POC for Phantom Attack☆79Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆173Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆127Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆155Updated 5 months ago
- An IDA processor for eBPF bytecode☆62Updated 3 months ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- An eBPF playground☆205Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆163Updated 9 months ago
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆142Updated 3 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆87Updated 7 months ago
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 2 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆72Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆99Updated 2 years ago
- ☆85Updated 7 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆107Updated 2 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 6 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- Recover 64 bit ELF executables from memory dump☆85Updated 6 years ago
- Kernel Read Write Execute☆84Updated 5 months ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆580Updated 7 months ago
- eBPF Processor for Ghidra☆216Updated 7 months ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆73Updated 2 years ago
- Vault Exploit Defense☆124Updated 5 months ago
- ☆41Updated 10 months ago
- system call hooking on arm64 linux via a variety of methods☆47Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆68Updated 2 weeks ago