Replicating an eBPF SDIV Oops
Vulnerable eBPF CTF Challenge 01
Interactivity is the halting problem in a trench coat.
Stop saying eBPF when you mean cBPF.
Never Stop Reading: Crashing the HaikuOS Port of Cave Story
whoami, who am I? Thoughts on protecting digital and human identities.
BeeSTrING: Critical Vulnerability in BPF Subsystem Allows Fully Unauthenticated RCE as Root
every Boring Problem Found in eBPF
eBPF for security: a beginner’s guide
Learning eBPF through gamification: The Hive CTF Challenge and Walkthrough