honey-potion
TripleCross
Our great sponsors
honey-potion | TripleCross | |
---|---|---|
6 | 11 | |
233 | 1,677 | |
4.3% | - | |
6.4 | 0.7 | |
about 1 month ago | about 1 year ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
honey-potion
-
Targetting C
Hi! We have been translating Elixir to C (which we translate to eBPF) in HoneyPotion. We used mostly Chapter 15 of Appel's Modern Compiler Implementation in Java to implement the code generator (that's "15. Functional Programming Languages"). I think the choice of C has been good thus far. The implementation of Elixir's pattern matching took much work, but if we had chosen a higher level target, we would still have to translate that to eBPF. Here's the entry point for the translator.
-
Suggestion for a backend?
We have been working on a tool that translates Elixir to eBPF. We actually translate eBPF to C. Now that we have more stuff working, I really wonder if generating C was a good choice.
-
Intersection of PLs with the OS
That's exactly what Honey Potion does, when we translate Elixir into Linux' eBPF!
TripleCross
-
eBPF – Running sandboxed programs in a privileged context such as OS kernel
This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.
eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.
Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.
[1] - https://github.com/citronneur/pamspy
[2] - https://github.com/h3xduck/TripleCross
[3] - https://github.com/krisnova/boopkit
[4] - https://github.com/pathtofile/bad-bpf
[5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...
-
Show HN: Credentials dumper for Linux using eBPF
Related: TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
What are some alternatives?
ebpfkit - ebpfkit is a rootkit powered by eBPF
bad-bpf - A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29
tubular - BSD socket API on steroids
ebpfkit-monitor - ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits
pl0c - Self-hosting PL/0 to C compiler to teach basic compiler construction from a practical, hands-on perspective.
fping - High performance ping tool
libfirm - graph based intermediate representation and backend for optimising compilers
bpftool - Automated upstream mirror for bpftool stand-alone build.
libs - libsinsp, libscap, the kernel module driver, and the eBPF driver sources
bouheki - bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.
dirtypipe-ebpf_detection - An eBPF detection program for CVE-2022-0847
pamspy - Credentials Dumper for Linux using eBPF