Working examples of KRSI (via BCC scripts).
☆15Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for bcc-lsm-scripts
Users that are interested in bcc-lsm-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 17, 2020Updated 5 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Feb 9, 2021Updated 5 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Jun 30, 2022Updated 3 years ago
- ebpH (Extended BPF Process Homeostasis) monitors process behavior on your system to establish normal behavioral patterns. ebpH reports an…☆42Dec 8, 2022Updated 3 years ago
- ☆13May 17, 2020Updated 5 years ago
- Jibril: A performant and low impact Linux runtime security tool agent.☆15May 25, 2025Updated 9 months ago
- Expose a Google Sheet as a GraphQL API using a free Google Apps Script☆12Jan 7, 2023Updated 3 years ago
- Repo for new Blåmba! content☆10Mar 12, 2025Updated last year
- ☆22Updated this week
- ☆17Oct 9, 2023Updated 2 years ago
- provides pidfd support on linux 5.6+☆16Apr 2, 2021Updated 4 years ago
- ☆11Feb 22, 2016Updated 10 years ago
- Schematics, board layout and BOM☆12May 1, 2019Updated 6 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- Modern line-oriented terminal emulator without support for TUIs☆17Apr 7, 2022Updated 3 years ago
- Linux uhid api in Go.☆12Sep 27, 2023Updated 2 years ago
- Vagrant VLAN plugin☆13Oct 29, 2021Updated 4 years ago
- A standalone Eye-Fi server in Node.js for the Mobi Series☆12Mar 26, 2015Updated 10 years ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆16Oct 31, 2021Updated 4 years ago
- ☆13Jan 21, 2026Updated 2 months ago
- An example implementation of the Zebra BPF DPlane☆13Jan 8, 2023Updated 3 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- MQTT Input Plugin for Graylog☆13May 6, 2024Updated last year
- Visualisation for Data scraped from the Spaceapi☆20Feb 27, 2019Updated 7 years ago
- flex(词法分析)和bison(语法分析)的使用实例代码以及PDF版本的电子书☆11May 26, 2017Updated 8 years ago
- BS3: Block device in S3☆13Apr 19, 2022Updated 3 years ago
- Submission to the InformatiCup2021 challenge.☆11Feb 4, 2024Updated 2 years ago
- User space agent and eBPF programs that provide INT support to end hosts☆15Jan 20, 2022Updated 4 years ago
- fast IP to CIDR lookup, longest prefix match in golang☆11Feb 3, 2024Updated 2 years ago
- TCPause is a zero-downtime proxy for TCP and UNIX sockets written in Go.☆15Jul 10, 2019Updated 6 years ago
- Docker Images definitions and utility scripts for rapid development and deployment of REDHAWK SDR systems, Domains, and Devices.☆11Jan 13, 2022Updated 4 years ago
- ☆13May 27, 2022Updated 3 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- Richtlinien für Designs und Styleguides von Chaos-Veranstaltungen☆17May 31, 2025Updated 9 months ago
- golang implementation of a simple ssdp server/client☆13Jan 2, 2018Updated 8 years ago
- Metronome: adaptive and precise intermittent packet retrieval in DPDK☆16Jun 13, 2024Updated last year
- vagrant-kubernetes-3-node-cluster-ubuntu-20.04☆11Mar 16, 2026Updated last week
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Dec 16, 2025Updated 3 months ago