This is a proof-of-concept example of using eBPF to Monitor for changes to eBPF Maps from user and kernel programs. This was written to accompany the blog Mapping It Out: Analyzing the Security of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback