With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However, running code in the kernel comes...

This is a video that really got me looking into bpf more deeply

simply bpf goodies

  • 0 users online
  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 2 subscribers
  • 8 Posts
  • 0 Comments
  • Modlog