sagarbhure / eBPFShield
☆62Updated last year
Alternatives and similar repositories for eBPFShield:
Users that are interested in eBPFShield are comparing it to the libraries listed below
- ☆85Updated 6 months ago
- Publications from the eBPF foundation☆22Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated last month
- masscan with exclusive excludes☆55Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆46Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆59Updated last month
- ☆31Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated 11 months ago
- Check IP addresses against known cloud provider IP address ranges☆43Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆62Updated 4 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Script to test NetSec capabilities.☆21Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 6 months ago
- A distributed network mapper/security scanner.☆16Updated last year
- Kubernetes offensive framework built in eBPF☆36Updated last year
- egrets monitors egress☆46Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆18Updated 2 years ago
- Find what egress ports are allowed☆38Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆20Updated 2 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆50Updated last week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆41Updated this week
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 5 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 7 months ago