RIP
nsjail
Our great sponsors
RIP | nsjail | |
---|---|---|
4 | 6 | |
1,477 | 2,781 | |
- | 2.2% | |
0.0 | 7.9 | |
3 months ago | 2 months ago | |
C++ | C++ | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
RIP
- Favorite GitHub projects?
- GitHub - geemion/Khepri: π₯π₯π₯Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
- Khepri: open source Cobalt Strike-like post-exploitation tool written in Golang and C++
- Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
nsjail
-
Server-side sandboxing: Containers and seccomp
So what's the difference between nsjail[1] and bubblewrap[2]?
[1] https://github.com/google/nsjail
- Firejail: Light, featureful and zero-dependency security sandbox for Linux
-
Sandboxing C++, Rust, Python Code?
I am currently working on a code execution engine (also written in Rust) which uses nsjail for sandboxing and gnu time for measuring time and memory usage under the hood. You can run arbitrary code simply using a rest api and there is also a client library for Rust. It can already run C++, Rust and Python (and a few other languages) while allowing you to specify multiple source files, environment variables, command line arguments, standard input and resource limits (e.g. time, memory, maximum number of processes and whether network access is allowed or not). After running the program, the engine reports exit codes, outputs (stdout and stderr) and the amount of resources the program used.
- WebAssembly: Adding Python Support to WASM Language Runtimes
- Notes on Running Containers with Bubblewrap
- Bubblewrap: Unprivileged Sandboxing Tool for Linux
What are some alternatives?
klogg - Really fast log explorer based on glogg project
bubblewrap - Low-level unprivileged sandboxing tool used by Flatpak and similar projects
serpentine - C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
crosvm - The Chrome OS Virtual Machine Monitor - Mirror of https://chromium.googlesource.com/crosvm/crosvm/
geacon - Practice Go programming and implement CobaltStrike's Beacon in Go
wasmtime-py - Python WebAssembly runtime powered by Wasmtime
CrossC2 - generate CobaltStrike's cross-platform payload
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
Mudlet - βοΈ A cross-platform, open source, and super fast MUD client with scripting in Lua
sandkasten - Run untrusted code in an isolated environment
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
wasmer-python - ππΈ WebAssembly runtime for Python