A system call interception tool
☆57Dec 9, 2024Updated last year
Alternatives and similar repositories for e9syscall
Users that are interested in e9syscall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful static binary rewriting tool☆1,104Mar 3, 2026Updated last month
- Kiddy - (linux) kernel identity spoofer☆16Mar 18, 2024Updated 2 years ago
- AFL binary instrumentation☆310Jan 17, 2025Updated last year
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆18Aug 7, 2020Updated 5 years ago
- ☆13May 31, 2023Updated 2 years ago
- A binary hardening system☆111Sep 30, 2023Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Monitor, rewrite and/or otherwise trap system calls... on Linux/x86{,-64} only, for now.☆66Nov 24, 2025Updated 5 months ago
- ☆21May 17, 2023Updated 2 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆13Feb 1, 2022Updated 4 years ago
- Unpacker for donut shellcode☆22Jun 20, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple example of using Windows Hypervisor Platform (WHP)☆13Dec 18, 2020Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- ☆24Oct 30, 2024Updated last year
- ☆10Jan 30, 2022Updated 4 years ago
- collection of helper tools for fuzzing☆17Oct 3, 2023Updated 2 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- ☆11Jul 9, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆20Nov 8, 2020Updated 5 years ago
- A fast and accurate disassembler☆748Apr 17, 2026Updated last week
- CVE-2026-20637: AppleSEPKeyStore Use-After-Free — iOS/macOS kernel vulnerability (patched in 26.4)☆51Apr 6, 2026Updated 3 weeks ago
- Symbolic Execution Engine in Rust☆22Oct 8, 2023Updated 2 years ago
- Self-hosting binary instrumentation framework for security research☆224Aug 1, 2023Updated 2 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Oct 18, 2022Updated 3 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Mar 30, 2026Updated last month
- Technical webinars on reverse engineering, malware analysis, and software protection.☆43Mar 26, 2026Updated last month
- Flat Abstract Syntax Tree☆35Nov 4, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- python and honggfuzz☆26May 18, 2020Updated 5 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Similar to *script* without replay but with a mechanism to inject keytrokes in the slave's keyboard queue☆17Aug 1, 2021Updated 4 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Oct 24, 2024Updated last year
- A grubox theme for ghidra, available in all its variants☆18Aug 2, 2024Updated last year
- Official implementation for the paper "On deceiving malware classification with section injection"☆36Aug 16, 2022Updated 3 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago