linux ebpf backdoor demo
☆12Nov 20, 2024Updated last year
Alternatives and similar repositories for ebpf-backdoor-demo
Users that are interested in ebpf-backdoor-demo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-37051 poc and exploit☆29Jun 11, 2024Updated last year
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- PoC☆12Apr 7, 2025Updated 11 months ago
- Let sliver use msf payload!☆25Mar 23, 2025Updated last year
- ☆11May 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- Kubescape eBPF agent 🥷🏻☆30Updated this week
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- Yet another modern Linux kernel rootkit for educational purposes.☆78Mar 27, 2025Updated last year
- fuzz the linux kernel bpf verifier☆83Oct 9, 2021Updated 4 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple ftp server for file sharing between computers☆16Oct 6, 2024Updated last year
- vArmor-ebpf is a specialized project dedicated to maintaining the BPF code utilized by vArmor.☆41Jan 26, 2026Updated 2 months ago
- AWS IAM policy in Go☆19Mar 4, 2026Updated 3 weeks ago
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- 将任何 elf 或命令转换为 shellcode☆61Mar 20, 2024Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Exploit tool implemented using ebpf.☆212Jun 4, 2024Updated last year
- 2023白帽补天大会部分代码☆129Dec 26, 2023Updated 2 years ago
- A vul-finder for loading CPG and automated finding vul-call-chains☆72Jul 22, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆27Apr 21, 2025Updated 11 months ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- A few resources for fuzzing☆17Sep 25, 2022Updated 3 years ago
- ☆15Jan 30, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆17Mar 22, 2019Updated 7 years ago
- ☆20Nov 11, 2022Updated 3 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- Lightdash文件读取漏洞(CVE-2023-35844)☆20Jun 26, 2023Updated 2 years ago
- CVE-2023-46604☆29Oct 26, 2023Updated 2 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆75Jan 21, 2024Updated 2 years ago