runtime-security

There are 24 repositories under runtime-security topic.

  • Mobile-Security-Framework-MobSF

    MobSF/Mobile-Security-Framework-MobSF

    Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

    Language:JavaScript19.4k5941.5k3.5k
  • falco

    falcosecurity/falco

    Cloud Native Runtime Security

    Language:C++8.3k1261.4k940
  • aquasecurity/tracee

    Linux Runtime Security and Forensics using eBPF

    Language:Go4.1k541.6k463
  • step-security/harden-runner

    Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.

    Language:TypeScript8771111076
  • Gui774ume/ebpfkit

    ebpfkit is a rootkit powered by eBPF

    Language:C78618692
  • OWASP/iGoat-Swift

    OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS

    Language:C4431721199
  • chriskaliX/Hades

    Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)

    Language:C297114355
  • aquasecurity/traceeshark

    Deep Linux runtime visibility meets Wireshark

    Language:C2945414
  • Gui774ume/ebpfkit-monitor

    ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits

    Language:C1276417
  • willfindlay/bpfbox

    🐝 BPFBox 📦 Exploring process confinement in eBPF

    Language:C1011239
  • kube-tarian/tarian

    Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runtime processes monitoring, automated actions based on configure-actions, analytics, alerting and also sharing detections with community. Maybe save from Ransomware. Shift-Left your threat detection. Shift Right threat elimination.

    Language:Go5656412
  • kubearmor/policy-templates

    Community curated list of System and Network policy templates for the KubeArmor and Cilium

  • KubeDagger

    yasindce1998/KubeDagger

    Kubernetes offensive framework built in eBPF

    Language:C37112
  • pyrasp

    rbidou/pyrasp

    PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (AWS Lambda, Azure and Google Cloud Functions) and MCP Servers (FastMCP)

    Language:Python32343
  • atellaluca/ImportSpy

    Runtime validation for Python modules. Enforce compliant environments, prevent unsafe imports.

    Language:Python24102
  • Loginsoft-LLC/Linux-Exploit-Detection

    Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma

    Language:Open Policy Agent21201
  • listendev/action

    Proactive security monitoring and threat detection in CI/CD

    Language:TypeScript144360
  • listendev/jibril-releases

    Jibril: A performant and low impact Linux runtime security tool agent.

    Language:Shell131
  • falcosecurity/kernel-testing

    Ansible playbooks to provision firecracker VMs and run Falco kernel tests

    Language:Dockerfile12416
  • amir9339/ebpf_maps_hooking

    POC developed while writing the paper "A weakness in eBPF-based runtime security applications"

    Language:C1100
  • nikhilnayak98/csvs

    CentOS based Docker Security Architecture

    Language:Shell1100
  • tigera-solutions/cc-aks-implement-runtime-security

    In this AKS-focused workshop, you will work with Calico Cloud to learn how to implement runtime security to protect containers in your Kubernetes cluster from known and zero-day threats based container and network attacks running on Microsoft AKS.

  • iamgp21/capstone-runtime-sec

    POC Repo for Implementing Runtime Security fo a Kubernetes Cluster.

    Language:Go0100
  • tigera-solutions/cc-aks-visualize-identify-security-gaps

    This repository supports the "Microsoft AKS Security Bootcamp: Visualize cluster traffic and identify security gaps" workshop, providing step-by-step guidance for hands-on security experience, including network risk assessment, malware alerts, threat containment, anomaly detection, and policy enforcement.