vmware-archive / cbsensor-linux-bpfLinks
Linux endpoint events for BPF enabled systems
☆24Updated 2 years ago
Alternatives and similar repositories for cbsensor-linux-bpf
Users that are interested in cbsensor-linux-bpf are comparing it to the libraries listed below
Sorting:
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆116Updated 2 years ago
- eBPF - extended Berkeley Packet Filter tooling☆123Updated 3 years ago
- Linux Kernel module for Carbon Black EDR☆12Updated 4 years ago
- Red Canary's eBPF Sensor☆108Updated last month
- ☆88Updated last year
- Linux Kernel Runtime Integrity with eBPF☆179Updated last year
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆133Updated 2 years ago
- Trace deep kernel events through eBPF and lsm hooks☆37Updated 4 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Updated 2 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆43Updated 5 years ago
- Vault Exploit Defense☆127Updated 10 months ago
- An eBPF playground☆206Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆148Updated 3 years ago
- egrets monitors egress☆46Updated 5 years ago
- Capsule8: open-source cloud-native behavioral security monitoring☆33Updated 7 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Get live information about applications that make network requests (based on eBPF)☆51Updated 5 months ago
- Dectect syscall hooking using eBPF☆158Updated 2 years ago
- python based memory injection/introspection/etc☆47Updated 2 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.☆66Updated 6 years ago
- ☆47Updated 6 years ago
- ☆246Updated 4 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Example BPF program with LSM hooks☆33Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 3 months ago