A rootkit that leverages eBPF to implement offensive security techniques like container breakouts, network scanning, and RASP bypass.
ebpfkit is a rootkit that leverages eBPF (Extended Berkeley Packet Filter) technology to implement offensive security techniques. It demonstrates how kernel-level eBPF capabilities can be weaponized for malicious activities including container breakouts, network scanning, file system monitoring, and bypassing security protections. The project serves as an educational resource showing the potential security risks of eBPF technology.
Security researchers, ethical hackers, and penetration testers who want to understand offensive eBPF techniques and container security vulnerabilities. Also valuable for security engineers defending against kernel-level attacks.
Provides a comprehensive demonstration of eBPF's offensive capabilities in a single tool, with features covering multiple attack vectors. It's specifically designed for educational purposes to help security professionals understand and defend against sophisticated kernel-level threats.
ebpfkit is a rootkit powered by eBPF
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Implements a wide range of rootkit features such as obfuscation, container breakouts, and network scanning, as detailed in the BlackHat and Defcon talk demos.
Based on presented research at major security conferences, it provides practical insights into eBPF vulnerabilities and offensive techniques for security professionals.
Includes step-by-step CLI usage with outputs for features like passive network sniffing and file exfiltration, easing experimentation and learning.
Uses Apache 2.0 for Go code and GPL v2 for eBPF programs, with explicit warnings about legal misuse, fostering responsible educational use.
Requires Ubuntu Focal with kernel 5.4 and specific build tools like Graphviz, making it difficult to run on other distributions or newer kernels.
Building involves multiple steps, kernel header installation, and tools like go-bindata, which can be time-consuming and error-prone for newcomers.
Based on 2021 talks with no mention of updates, so it might not reflect current eBPF security landscapes or detection mechanisms.
Emphasis on criminal charges for misuse limits practical application, requiring strict isolation and authorization in lab environments only.