vmware-archive / cbsensor-linux-bpf
Linux endpoint events for BPF enabled systems
☆24Updated 2 years ago
Alternatives and similar repositories for cbsensor-linux-bpf:
Users that are interested in cbsensor-linux-bpf are comparing it to the libraries listed below
- Linux Kernel module for Carbon Black EDR☆12Updated 4 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆117Updated last year
- Linux Kernel Runtime Integrity with eBPF☆173Updated last year
- ☆86Updated 8 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆126Updated 2 years ago
- Trace deep kernel events through eBPF and lsm hooks☆35Updated 4 years ago
- eBPF - extended Berkeley Packet Filter tooling☆123Updated 2 years ago
- Red Canary's eBPF Sensor☆102Updated 8 months ago
- egrets monitors egress☆45Updated 4 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆42Updated 4 years ago
- gyp: A pure Go YARA parser☆106Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆146Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- Fork from git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git (unstable and force pushed!)☆20Updated last year
- Capsule8: open-source cloud-native behavioral security monitoring☆32Updated 7 years ago
- Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.☆66Updated 5 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 2 weeks ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated 10 months ago
- Vault Exploit Defense☆124Updated 6 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Get live information about applications that make network requests (based on eBPF)☆48Updated last month
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Container for assorted volatility plugins.☆22Updated 11 years ago
- SysFlow documentation and issues tracker☆46Updated 5 months ago
- ☆47Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Example BPF program with LSM hooks☆33Updated 4 years ago
- ☆18Updated 4 years ago