quarkslab / peetchLinks
An eBPF playground
☆210Updated 2 years ago
Alternatives and similar repositories for peetch
Users that are interested in peetch are comparing it to the libraries listed below
Sorting:
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago
- Dectect syscall hooking using eBPF☆166Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- ☆89Updated last week
- An eBPF program debugger☆214Updated 3 years ago
- Get live information about applications that make network requests (based on eBPF)☆53Updated 3 months ago
- POC for Phantom Attack☆88Updated 3 years ago
- monitor and protect SSH sessions with eBPF☆71Updated 4 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆673Updated last year
- Vault Exploit Defense☆127Updated last year
- ebpfkit is a rootkit powered by eBPF☆822Updated 2 years ago
- ☆468Updated last month
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆135Updated 3 years ago
- eBPF - extended Berkeley Packet Filter tooling☆131Updated 3 years ago
- A file system events notifier based on eBPF☆73Updated last week
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- Red Canary's eBPF Sensor☆112Updated 6 months ago
- 📡🐧 Linux kernel syscall implementation tracker☆238Updated 2 months ago
- Quarkslab conference talks☆309Updated last month
- Disable SSL certificate verification for all binaries that use libssl☆48Updated 3 years ago
- eBPF hacks☆188Updated last year
- Example BPF program with LSM hooks☆34Updated 4 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Use eBPF to inject chaos into local processes☆66Updated last year
- ☆310Updated 2 years ago
- io_uring based rootkit☆245Updated 7 months ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆25Updated last year