Closed h3xduck closed 2 years ago
We have created a Linux eBPF rootkit showing the offensive capabilities of the eBPF technology, based on the work of the DEFCON talks. We would like to have it included in the list under the security section if you find it appropiate.
We have created a Linux eBPF rootkit showing the offensive capabilities of the eBPF technology, based on the work of the DEFCON talks. We would like to have it included in the list under the security section if you find it appropiate.