bcc
tracee
bcc | tracee | |
---|---|---|
71 | 12 | |
19,499 | 3,261 | |
1.0% | 1.8% | |
9.2 | 9.8 | |
4 days ago | 3 days ago | |
C | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bcc
-
eBPF: Unleashing Kernel Magic for Modern Infrastructure
But wait, there's more! Enter the BCC toolkit and library, your trusty sidekick in simplifying the arcane art of writing eBPF applications. With BCC by your side, you'll be wielding eBPF like a seasoned pro in no time.
-
Linux: Easy Keylogger with eBPF (2018)
Nice - I normally use [bash-readline](https://github.com/iovisor/bcc/blob/master/tools/bashreadlin...) when coworking/co-inhabiting a server or training someone.
-
eBPF Documentary
One of the big wins is not so much “build and run your own stuff” but there are very nice low-cost (in terms of compute) performance utilities built on eBPF
https://github.com/iovisor/bcc
There are so many utilities in that list; there’s a diagram midway down the readme which tries to help show their uses. bcc-tools should be available in any distro.
Also, Brendan Gregg does a ton of performance stuff that is worth knowing about if you check out his other work. Not eBPF only. Flame graphs are useful.
- Bpftop: Streamlining eBPF performance optimization
-
eBPF Tutorial by Example 16: Monitoring Memory Leaks
Reference: https://github.com/iovisor/bcc/blob/master/libbpf-tools/memleak.c
- eBPF Tutorial by Example 9: Capturing Scheduling Latency and Recording as Histogram
-
Uprobes Siblings - Capturing HTTPS Traffic: A Rust and eBPF Odyssey
In this article, we'll build a basic version of an HTTPS sniffer, inspired by bcc-sslsniff.py, but we'll use Rust and Aya. We're going to demonstrate the capabilities of uprobes by employing uprobe and uretprobe along with familiar maps like PerCpuArray, HashMap, and PerEventArray. This will be a straightforward example to help us explore how uprobes function.
-
Issue XDP_REDIRECT on other interface in the same namespace
As xpd program I am using the BCC example xdp_redirect_map.py in skb mode as my NIC does not support native mode, attaching the program to veth2 and a dummy function to veth3
-
Linux runtime security agent powered by eBPF
https://github.com/iovisor/bcc/blob/master/docs/reference_gu...
- eBPF Practical Tutorial: Capturing SSL/TLS Plain Text Data Using uprobe
tracee
- Linux runtime security agent powered by eBPF
-
Identifying PID generating DNS requests
There're many other tools: https://github.com/aquasecurity/tracee from AquaSecurity for example
-
Help identifying which process is sending network requests
You can also use tracee, or auditd
-
How do I intercept executed commands in user space?
If you're interested specifically in bash, you can look into bcc's bashreadline to output user commands. If you're interested in applying security policies to potential user commands, you can also take a look at Tracee although other open source solutions exist here as well.
-
Implement DevSecOps to Secure your CI/CD pipeline
Falco is a cloud native Kubernetes threat detection tool. It can detect unexpected behavior, intrusions, and data theft in real time. In the backend, it uses Linux eBPF technology to trace your system and applications at runtime. For example, it can detect if someone tries to read a secret file inside a container, access a pod as a root user, etc, and trigger a webhook or send logs to the monitoring system. There are similar tools like Tetragon, KubeArmor, and Tracee which also provide Kubernetes runtime security.
- Debian 10 - Potentially infected by Hajime Threat
-
Ask HN: Who is hiring? (January 2022)
Aqua Security | Open Source Engineer (Go) | Remote
Aqua Security provides the next generation of Cloud Native security solutions, and open source has been core to our DNA and strategy. Our Open Source team is fully remote worldwide.
- https://github.com/aquasecurity/starboard : Kubernetes security, api-machinery and operators, security tool orchastration.
- https://github.com/aquasecurity/trivy : Vulnerability and misconfiguration scanning, image/packages/code, static analysis.
- https://github.com/aquasecurity/tracee : Runtime security, detect suspicious behavior, Linux and eBPF.
I'm the hiring manager, feel free to DM me on twitter @itaysk if you have questions.
Apply here: https://www.aquasec.com/about-us/careers/co/engineering/81.E...
I will also be looking for an Engineering Manager to join the team soon. Responsibilities include people management, product direction, cross-team collaboration enablement. Need to understand the cloud native and opens source landscape. If you're interested please DM me on Twitter since the job posting isn't up yet.
-
Found malware on my system... can anyone tell me what it is? (or where better to ask)
Besides opensnitch to monitor outbound connections you can use https://github.com/aquasecurity/tracee/tree/main/tracee-ebpf or the bpfcc-tools (apt install bpfcc-tools, opensnoop-bpfcc, execsnoop-bpfcc, tcpconnect-bpfcc, etc) to monitor the system, just in case there's something still running.
-
Ask HN: Who is hiring? (May 2021)
Aqua Security provides the next generation of Cloud Native security solutions, and open source has been a core part to our DNA and strategy. Our Open Source team is fully remote worldwide. We are looking to expand with:
- Golang / Kubernetes engineer for https://github.com/aquasecurity/starboard
- Golang engineer for https://github.com/aquasecurity/trivy
- eBPF/kernel developer for https://github.com/aquasecurity/tracee
I'm the hiring manager, feel free to DM me on twitter @itaysk if you have questions.
Apply here: https://www.aquasec.com/about-us/careers/co/engineering/81.E...
- #Tracee: Seguridad y análisis forense en tiempo de ejecución con eBPF 🛡
What are some alternatives?
libbpf - Automated upstream mirror for libbpf stand-alone build.
falco - Cloud Native Runtime Security
bpftrace - High-level tracing language for Linux eBPF [Moved to: https://github.com/bpftrace/bpftrace]
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
ebpf-for-windows - eBPF implementation that runs on top of Windows
ThreatMapper - Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
zfs - OpenZFS on Linux and FreeBSD
libseccomp - The main libseccomp repository
linux - Linux kernel source tree
eBPF-Guide - eBPF (extended Berkeley Packet Filter) Guide. Learn all about the eBPF Tools and Libraries for Security, Monitoring , and Networking.
nokogiri-rust - Ruby FFI wrapper around scraper crate to be used instead of Nokogiri. Status: proof of concept.
ebpfkit - ebpfkit is a rootkit powered by eBPF