willfindlay / ebpH
ebpH (Extended BPF Process Homeostasis) monitors process behavior on your system to establish normal behavioral patterns. ebpH reports anomalous behavior and prevents attacks by denying anoamlous access requests.
β41Updated 2 years ago
Alternatives and similar repositories for ebpH:
Users that are interested in ebpH are comparing it to the libraries listed below
- π BPFBox π¦ Exploring process confinement in eBPFβ101Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkitsβ126Updated 2 years ago
- Example BPF program with LSM hooksβ33Updated 4 years ago
- Trace deep kernel events through eBPF and lsm hooksβ35Updated 4 years ago
- bpflock - eBPF driven security for locking and auditing Linux machinesβ147Updated 3 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.β117Updated last year
- A process level network security monitoring and enforcement project for Kubernetes, using eBPFβ42Updated 4 years ago
- Linux Kernel Runtime Integrity with eBPFβ173Updated last year
- fuzzing framework based on libfuzzer and clang sanitizerβ166Updated 5 years ago
- β86Updated 9 months ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable thanβ¦β64Updated 2 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploitsβ21Updated 3 years ago
- eBPF - extended Berkeley Packet Filter toolingβ123Updated 2 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.β58Updated 2 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencodersβ132Updated 2 years ago
- eBPF based syscalls, files and network events tracing frameworkβ93Updated 4 years ago
- β18Updated 4 years ago
- Velocity SJC 2019 - DDoS mitigation made easy with XDP and eBPFβ109Updated 5 years ago
- Get live information about applications that make network requests (based on eBPF)β48Updated 2 months ago
- Vault Exploit Defenseβ124Updated 6 months ago
- Sample ebpf programs to analyzeβ91Updated 3 months ago
- POC for Phantom Attackβ80Updated 2 years ago
- β24Updated 3 years ago
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.β89Updated 4 years ago
- Lind: Secure Lightweight Adaptive Isolationβ29Updated 5 months ago
- Alcatraz project for Black Hat USA 2021β78Updated 3 years ago
- Application-level firewalling using systemd socket action and eBPF filtersβ17Updated 7 years ago
- Example program using eBPF to log data being based in using shell pipesβ41Updated 4 years ago
- β83Updated 7 years ago
- An eBPF program debuggerβ203Updated 2 years ago