sagarbhure / eBPFShield
☆63Updated last year
Alternatives and similar repositories for eBPFShield:
Users that are interested in eBPFShield are comparing it to the libraries listed below
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆23Updated 6 months ago
- ☆86Updated 8 months ago
- Publications from the eBPF foundation☆22Updated 4 months ago
- ☆68Updated 2 months ago
- ☆32Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆48Updated last year
- masscan with exclusive excludes☆54Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆64Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Check IP addresses against known cloud provider IP address ranges☆44Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- ☆15Updated 8 months ago
- Open Source eBPF Malware Analysis Framework☆47Updated 5 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆36Updated last month
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 2 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Find what egress ports are allowed☆39Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- First iteration of ML based Feedback WAF☆58Updated last year
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆78Updated this week
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- One line command and control backdoors for APIs and web applications.☆50Updated 11 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year