mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-06 09:30:58 +01:00
![]() * Allow to intercept some kernel connections Some connections are initiated from kernel space, like WireGuard VPNs (#454), NFS or SMB connections (#502) and ip tunnels (#500). Note: This feature is complete for x86_64, WIP for aarch64, and not supported for armhf and i386 https://github.com/evilsocket/opensnitch/pull/513#issuecomment-924400824 More information regarding this change: #493 |
||
---|---|---|
.. | ||
audit | ||
ebpf | ||
monitor | ||
activepids.go | ||
activepids_test.go | ||
cache.go | ||
cache_test.go | ||
details.go | ||
find.go | ||
find_test.go | ||
parse.go | ||
process.go | ||
process_test.go | ||
watcher.go |