Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Activate the userspace runtime config for active ebpf modules from the remote client connected to the backdoor. #14

Open
h3xduck opened this issue Jan 6, 2022 · 1 comment
Labels
enhancement New feature or request network
Projects

Comments

@h3xduck
Copy link
Owner

h3xduck commented Jan 6, 2022

No description provided.

@h3xduck h3xduck created this issue from a note in TFG Roadmap (In progress) Jan 6, 2022
@h3xduck h3xduck added enhancement New feature or request network labels Jan 6, 2022
@h3xduck h3xduck moved this from In progress to To do in TFG Roadmap Jan 6, 2022
@h3xduck
Copy link
Owner Author

h3xduck commented Jul 6, 2022

This is already done via the -u and -a modes of the rootkit client, but It would be cool to control which specific ebpf programs are active instead of just all or none.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request network
Projects
Development

No branches or pull requests

1 participant