BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance by compiling a high-level language into a highly efficient native implementation. It uses a novel optimization technique called "redundant predicate elimination" to minimize computation by exploiting semantic redundancies across multiple, independent filters. BPF+ derives from the BSD packet filter (BPF) and includes a filter program translator, a byte code optimizer, a byte code safety verifier, and a just-in-time assembler to convert byte codes to efficient native code. It provides a programmable selection criterion for classifying or selecting packets from a packet stream in a generic, reusable fashion, making it suitable for applications like network monitoring and intrusion detection that require both flexibility and high performance. BPF+ has been shown to achieve performance comparable to state-of-the-art packet filter architectures and better than hand-coded filters written in C.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.
A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.
A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.