bouheki
pwru
Our great sponsors
bouheki | pwru | |
---|---|---|
1 | 7 | |
74 | 2,447 | |
- | 5.6% | |
0.0 | 9.0 | |
about 1 year ago | about 11 hours ago | |
C | C | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bouheki
-
How to Prevent Data Exfiltration with eBPF
In this article, I will introduce bouheki, a tool that blocks data exfiltration by supply chain attacks and SSRF.
pwru
- GitHub - cilium/pwru: Packet, where are you? -- eBPF-based Linux kernel networking debugger
- cilium/pwru: Packet, where are you? -- eBPF-based Linux kernel networking debugger
-
Packet, where are you? – eBPF-based Linux kernel networking debugger
if you have a recent enough kernel, this change https://github.com/cilium/pwru/pull/148 means that it will print the reason the packet was dropped in the output - see https://lwn.net/Articles/885729/
There's a whole heap of reasons a packet can be dropped:
-
A list of new(ish) command line tools – Julia Evans
[pwru](https://github.com/cilium/pwru) is a fun new tool from the Cilium folks for tracing network packets in the kernel. Like tcpdump but it shows you the full path including kernel syscalls. Lets you debug much deeper than "when the packet gets to this port it gets dropped".
-
Better visibility into Linux packet-dropping decisions
I recently came across another useful utility for debugging unexpected packet drops - PWRU[0] (Packet, Where Are You) by Cilium.
It uses eBPF to try to trace the path of the packet through the kernel. Haven't needed to use it yet, but it could have saved me a lot of trouble in the past.
What are some alternatives?
lkrg - Linux Kernel Runtime Guard
parca-agent - eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code changes or restarts needed!
machine-learning-in-ebpf - This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl
fsmon - monitor filesystem on iOS / OS X / Android / FirefoxOS / Linux
ebpfkit - ebpfkit is a rootkit powered by eBPF
libbpf - Automated upstream mirror for libbpf stand-alone build.
TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
bpfcov - Source-code based coverage for eBPF programs actually running in the Linux kernel
gsocket - Connect like there is no firewall. Securely.
glow - Render markdown on the CLI, with pizzazz! 💅🏻
openbsm - OpenBSM open audit implementation
lnav - Log file navigator