BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance by compiling a high-level language into a highly efficient native implementation. It uses a novel optimization technique called "redundant predicate elimination" to minimize computation by exploiting semantic redundancies across multiple, independent filters. BPF+ derives from the BSD packet filter (BPF) and includes a filter program translator, a byte code optimizer, a byte code safety verifier, and a just-in-time assembler to convert byte codes to efficient native code. It provides a programmable selection criterion for classifying or selecting packets from a packet stream in a generic, reusable fashion, making it suitable for applications like network monitoring and intrusion detection that require both flexibility and high performance. BPF+ has been shown to achieve performance comparable to state-of-the-art packet filter architectures and better than hand-coded filters written in C.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.
A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.
A quick reference guide for the VI editor, covering commands and modes.
A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.
A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.