quarkslab / peetchLinks
An eBPF playground
☆210Updated 2 years ago
Alternatives and similar repositories for peetch
Users that are interested in peetch are comparing it to the libraries listed below
Sorting:
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago
- Dectect syscall hooking using eBPF☆167Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- An eBPF program debugger☆215Updated 3 years ago
- ☆90Updated last month
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆679Updated last year
- ebpfkit is a rootkit powered by eBPF☆830Updated 2 years ago
- POC for Phantom Attack☆89Updated 3 years ago
- Get live information about applications that make network requests (based on eBPF)☆53Updated 4 months ago
- Vault Exploit Defense☆127Updated last year
- monitor and protect SSH sessions with eBPF☆73Updated 4 years ago
- ☆470Updated 3 months ago
- eBPF - extended Berkeley Packet Filter tooling☆132Updated 3 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- 📡🐧 Linux kernel syscall implementation tracker☆265Updated 3 months ago
- Red Canary's eBPF Sensor☆113Updated 7 months ago
- Disable SSL certificate verification for all binaries that use libssl☆48Updated 3 years ago
- Use eBPF to inject chaos into local processes☆67Updated last year
- eBPF Memory Dump Tool☆98Updated 5 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆137Updated 3 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆25Updated 2 years ago
- Quarkslab conference talks☆312Updated 2 months ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- io_uring based rootkit☆248Updated 9 months ago
- eBPF hacks☆195Updated last year
- ☆310Updated 2 years ago
- Example BPF program with LSM hooks☆35Updated 4 years ago