Learning eBPF from zero to hero
☆38Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for eBPF101
Users that are interested in eBPF101 are comparing it to the libraries listed below
Sorting:
- Various examples of using eBPF code☆18Jan 3, 2024Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- ☆15Jan 30, 2025Updated last year
- ☆17Mar 22, 2019Updated 6 years ago
- Burp插件,转发处理☆14Jan 17, 2023Updated 3 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- ☆14Jun 16, 2021Updated 4 years ago
- Apache-Flink-Web-Dashboard-RCE☆16Nov 15, 2019Updated 6 years ago
- 云原生安全漏洞☆17Sep 9, 2025Updated 5 months ago
- Java Chains 插件编写 demo☆14Mar 5, 2025Updated last year
- ☆38Oct 26, 2021Updated 4 years ago
- CVE-2022-0185 POC and Docker and Analysis write up☆39May 24, 2022Updated 3 years ago
- ☆17May 29, 2018Updated 7 years ago
- 通过RPC创建计划任务☆30May 18, 2025Updated 9 months ago
- eBPF学习☆19Jun 21, 2022Updated 3 years ago
- Burp条件竞争测试插件☆25Aug 21, 2025Updated 6 months ago
- generate facts from bytecode (source is https://github.com/plast-lab/doop-mirror/tree/master/generators)☆23Nov 24, 2024Updated last year
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- 开发和安全和运营:DevSecOps-Software development (Dev) and Security (Sec) and IT operations (Ops).☆28Apr 13, 2024Updated last year
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆104May 20, 2025Updated 9 months ago
- 一个基于jvm-sandbox高度定制化rasp☆58Sep 28, 2023Updated 2 years ago
- Java代码审计案例☆24May 16, 2021Updated 4 years ago
- ☆50Jul 9, 2025Updated 7 months ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Jul 12, 2021Updated 4 years ago
- idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等☆29Oct 2, 2024Updated last year
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 3 months ago
- Network Observability eBPF Agent☆197Updated this week
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- 方便自己搭建codeql环境和数据库的工具。☆64Aug 16, 2025Updated 6 months ago
- absolute safe code☆27Mar 20, 2017Updated 8 years ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆121Aug 19, 2025Updated 6 months ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆50May 4, 2025Updated 10 months ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 7 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 7 months ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- Collection of Linux eBPF slides/documents.☆982Nov 15, 2023Updated 2 years ago
- 批量获取网站基本信息☆86Feb 27, 2025Updated last year