bad-bpf
Kernel exploit demos
Demonstrates security vulnerabilities in the Linux kernel's eBPF system
A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29
549 stars
9 watching
81 forks
Language: C
last commit: 5 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
netronome/bpf-samples | Provides eBPF XDP demo applications for testing and demonstrating software and hardware offloading capabilities | 99 |
spencerdodd/kernelpop | Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
fzakaria/ebpf-mpls-encap-decap | Demonstrates packet encapsulation and decapsulation with MPLS labels using eBPF | 53 |
gui774ume/ebpfkit | A rootkit powered by eBPF designed to demonstrate offensive security techniques and bypass kernel protections. | 761 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 676 |
linux-lock/bpflock | A security solution using eBPF to restrict Linux access and protect against attacks | 136 |
vbpf/ebpf-samples | This repository provides a collection of sample eBPF programs for analysis and testing purposes. | 91 |
vbpf/ebpf-verifier | A tool that verifies the correctness of eBPF programs using an abstract interpretation approach | 391 |
xairy/kernel-exploits | A collection of proof-of-concept exploits for vulnerabilities in the Linux kernel | 1,450 |
gui774ume/ebpfkit-monitor | A tool designed to detect and protect against certain types of malicious eBPF bytecode | 123 |
trustedsec/pplfaultdumpbof | Tools for analyzing PPLFault-related malware behavior on Windows 10 | 133 |
h3xduck/triplecross | A Linux rootkit demonstrating the offensive capabilities of eBPF technology using various techniques such as backdoors, C2 channels and code injection. | 1,786 |
ebpfdev/explorer | A tool to explore and visualize the eBPF subsystem of Linux hosts | 81 |
bing0o/ctfs-exploits | A curated collection of exploits and vulnerabilities used in Capture The Flag (CTF) challenges | 1 |
0xjcn/damn-vulnerable-defi-v3-ctf | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |