libseccomp VS Lean and Mean Docker containers

Compare libseccomp vs Lean and Mean Docker containers and see what are their differences.

libseccomp

The main libseccomp repository (by seccomp)

Lean and Mean Docker containers

Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source) (by slimtoolkit)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
libseccomp Lean and Mean Docker containers
3 39
771 18,238
1.3% 0.9%
4.6 9.0
20 days ago 2 days ago
C Go
GNU Lesser General Public License v3.0 only Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

libseccomp

Posts with mentions or reviews of libseccomp. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-12-20.
  • Linux Security - Secure Computing Mode (seccomp)
    2 projects | /r/linux | 20 Dec 2022
    We can configure seccomp by the libseccomp (https://github.com/seccomp/libseccomp), the prctl(https://man7.org/linux/man-pages/man2/prctl.2.html) system call and/or the seccomp syscall (https://man7.org/linux/man-pages/man2/seccomp.2.html) and/or other CLI tools (like https://github.com/david942j/seccomp-tools) .
  • Show HN: Porting OpenBSD Pledge() to Linux
    10 projects | news.ycombinator.com | 14 Jul 2022
    Very nice! I'm a fan of OpenBSD and pledge(). I've had some success on Linux with libseccomp[0] which means you don't have to deal with BPF directly, but pledge() is obviously much much easier.

    0. https://github.com/seccomp/libseccomp

  • Zoom zero-day discovery makes calls safer, hackers $200k richer
    1 project | news.ycombinator.com | 11 Apr 2021
    Yeah the idea of wrangling raw BPF is a bit daunting. Just FYI, libseccomp (https://github.com/seccomp/libseccomp) exists to abstract away all the BPF stuff. It even comes prepackaged by the major distros (ex https://packages.debian.org/sid/libseccomp2) so you don't even have to compile it yourself.

Lean and Mean Docker containers

Posts with mentions or reviews of Lean and Mean Docker containers. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-05-07.

What are some alternatives?

When comparing libseccomp and Lean and Mean Docker containers you can also consider the following projects:

tracee - Linux Runtime Security and Forensics using eBPF

minideb - A small image based on Debian designed for use in containers

capstone - Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings. [Moved to: https://github.com/capstone-engine/capstone]

Go random string generator - Flexible and customizable random string generator

seccomp-scopes - Make Linux computing safe

pipx - Install and Run Python Applications in Isolated Environments

libbpf - Automated upstream mirror for libbpf stand-alone build.

dive - A tool for exploring each layer in a docker image

capsicum-linux - Linux kernel with Capsicum support

gophish - Open-Source Phishing Toolkit

misc - miscellaneous scripts and small programs

simple-scrypt - A convenience library for generating, comparing and inspecting password hashes using the scrypt KDF in Go 🔑