pathtofile / bpf-hookdetectLinks
Dectect syscall hooking using eBPF
☆156Updated 2 years ago
Alternatives and similar repositories for bpf-hookdetect
Users that are interested in bpf-hookdetect are comparing it to the libraries listed below
Sorting:
- POC for Phantom Attack☆83Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆159Updated 10 months ago
- Linux Kernel Runtime Integrity with eBPF☆179Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆133Updated 2 years ago
- An eBPF playground☆206Updated last year
- An IDA processor for eBPF bytecode☆66Updated 8 months ago
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 2 years ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- ☆62Updated 7 months ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆77Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- Vault Exploit Defense☆127Updated 10 months ago
- Packer/Protector for x86-64 ELF binaries on Linux☆156Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- A simple anti-rootkit Linux kernel module for an 'Operating Systems Security' course.☆15Updated 4 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆148Updated 3 years ago
- The demo of hidden process and ko module☆21Updated 2 years ago
- ☆130Updated 2 months ago
- Alcatraz project for Black Hat USA 2021☆78Updated 3 years ago
- Kernel Read Write Execute☆84Updated 10 months ago
- Linux EDR written in Golang and based on eBPF.☆241Updated 3 years ago
- ☆100Updated 3 years ago
- ☆304Updated 2 years ago
- Slides & Hands-on for the reverse engineering workshop☆180Updated 2 years ago
- ☆88Updated last year
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- A utility to fix intentionally corrupted UPX packed files.☆88Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year