sagarbhure / eBPFShield
☆63Updated 2 years ago
Alternatives and similar repositories for eBPFShield:
Users that are interested in eBPFShield are comparing it to the libraries listed below
- Check IP addresses against known cloud provider IP address ranges☆44Updated last year
- ☆86Updated 9 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆48Updated last year
- ☆70Updated 2 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 7 months ago
- masscan with exclusive excludes☆56Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 3 months ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Rebuild of portspoof in GO with additional features.☆14Updated this week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Publications from the eBPF foundation☆23Updated 5 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- ☆31Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- First iteration of ML based Feedback WAF☆58Updated last year
- Open Source eBPF Malware Analysis Framework☆47Updated 5 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated 9 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆24Updated 7 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- egrets monitors egress☆45Updated 5 years ago
- eBPF hacks☆186Updated 4 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago