bpf-developer-tutorial
TripleCross
bpf-developer-tutorial | TripleCross | |
---|---|---|
8 | 11 | |
1,957 | 1,677 | |
5.7% | - | |
8.5 | 0.7 | |
3 months ago | about 1 year ago | |
C | C | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bpf-developer-tutorial
-
eBPF Tutorial by Example 9: Capturing Scheduling Latency and Recording as Histogram
Complete source code can be found at: https://github.com/eunomia-bpf/bpf-developer-tutorial/tree/main/src/9-runqlat
-
The Secure Path Forward for eBPF runtime: Challenges and Innovations
We are github.com/eunomia-bpf, build open source projects to make eBPF easier to use, and exploring new technologies, toolchains and runtimes related to eBPF. For those interested in eBPF technology, check out our tutorial code repository at https://github.com/eunomia-bpf/bpf-developer-tutorial and our tutorials at https://eunomia.dev/tutorials/ for practical understanding and practice. The original text of this article is from https://eunomia.dev/blogs/ebpf-security, welcome to star and follow us.
-
eBPF Tutorial by Example: Learning eBPF Step by Step with Tools
GitHub Repo: https://github.com/eunomia-bpf/bpf-developer-tutorial
Github repo: https://github.com/eunomia-bpf/bpf-developer-tutorial
-
Exploring Seven-Layer Protocol Tracing with eBPF: HTTP and Beyond via Socket Filters and Syscall Tracing
Through this article, readers can gain a deep understanding of how to use eBPF technology for tracing seven-layer protocols, particularly HTTP traffic. This knowledge will help enhance the monitoring and analysis of network traffic, thereby improving application performance and security. If you're interested in learning more about eBPF and its practical applications, you can visit our tutorial code repository at https://github.com/eunomia-bpf/bpf-developer-tutorial or our website at https://eunomia.dev/tutorials/ for more examples and complete tutorials.
-
eBPF Practical Tutorial: Capturing SSL/TLS Plain Text Data Using uprobe
You can find the complete source code here: https://github.com/eunomia-bpf/bpf-developer-tutorial/tree/main/src/30-sslsniff
TripleCross
-
eBPF – Running sandboxed programs in a privileged context such as OS kernel
This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.
eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.
Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.
[1] - https://github.com/citronneur/pamspy
[2] - https://github.com/h3xduck/TripleCross
[3] - https://github.com/krisnova/boopkit
[4] - https://github.com/pathtofile/bad-bpf
[5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...
- TripleCross – Linux eBPF Rootkit
- GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
- Show HN: TripleCross – A Linux eBPF rootkit with a C2 system and more
- TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
- TripleCross: A Linux eBPF rootkit framework
-
Show HN: Credentials dumper for Linux using eBPF
Related: TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
https://github.com/h3xduck/TripleCross
- TripleCross: Linux eBPF Rootkit
- TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities
What are some alternatives?
wasm-bpf - WebAssembly library, toolchain and runtime for eBPF programs
ebpfkit - ebpfkit is a rootkit powered by eBPF
libbpf - Automated upstream mirror for libbpf stand-alone build.
bad-bpf - A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29
xdp-tutorial - XDP tutorial
tubular - BSD socket API on steroids
bpftune - bpftune uses BPF to auto-tune Linux systems
ebpfkit-monitor - ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits
bcc - BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
honey-potion - Writing eBPF programs with Elixir!
bpftool - Automated upstream mirror for bpftool stand-alone build.