This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than currently available tools.
☆70May 3, 2022Updated 3 years ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆39Nov 14, 2024Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆11Feb 22, 2016Updated 10 years ago
- ☆25Jun 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Jun 30, 2022Updated 3 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Kernel isolation tester.☆18Oct 20, 2022Updated 3 years ago
- OCI hook to trace syscalls and generate a seccomp profile☆337Mar 18, 2026Updated last week
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- Go library for installing a seccomp BPF system call filter.☆93Feb 10, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Generate an application profile containing metrics/properties for Kubernetes workloads based on runtime behavior.☆14Oct 1, 2024Updated last year
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 8 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- evolution of extant software☆24Jan 24, 2018Updated 8 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- Automatic AppArmor management for Docker containers☆16Jul 22, 2023Updated 2 years ago
- ☆22Dec 21, 2025Updated 3 months ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Static Binary Analysis Platform☆29Mar 8, 2026Updated 3 weeks ago
- DSL language to write seccomp filters☆37Apr 5, 2024Updated last year
- ☆38Feb 15, 2022Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- ☆28Nov 24, 2021Updated 4 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- linux kernel event log collector by ebpf☆35Mar 6, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆34May 19, 2019Updated 6 years ago
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- Streaming Generative AI Application on AWS☆14Jun 24, 2024Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- ☆11May 16, 2024Updated last year