shamedgh / confineLinks
This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than currently available tools.
☆70Updated 3 years ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below
Sorting:
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated last year
- Linux Kernel Runtime Integrity with eBPF☆183Updated 2 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆93Updated 2 months ago
- ☆24Updated last year
- ☆468Updated last month
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Updated 3 years ago
- 🐝 BPFBox 📦 Exploring process confinement in eBPF☆105Updated last year
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 4 years ago
- Linux Security Hardening for Confidential Compute☆69Updated last year
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- Lind: Secure Lightweight Adaptive Isolation☆32Updated 5 months ago
- Example BPF program with LSM hooks☆34Updated 4 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆167Updated 6 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- eBPF - extended Berkeley Packet Filter tooling☆131Updated 3 years ago
- ✨🔐 CNCF Fuzzers☆127Updated last week
- ☆13Updated 4 years ago
- Trace system calls from Docker containers running on the system☆32Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated 2 weeks ago
- Vault Exploit Defense☆127Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- Fuzz Introspector -- introspect, extend and optimise fuzzers☆434Updated last week
- Practical Data-Only Attack Generation☆43Updated last year
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Updated 3 years ago
- Source-code based coverage for eBPF programs actually running in the Linux kernel☆135Updated 9 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- An eBPF program debugger☆214Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago