alexandernst / monks
Procmon alternative for Linux
☆71Updated 9 years ago
Alternatives and similar repositories for monks:
Users that are interested in monks are comparing it to the libraries listed below
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Trusted Path Execution (TPE) Linux Kernel Module☆158Updated 5 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- ☆62Updated last year
- Routines for hunting down kernel symbols.☆82Updated 13 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Linux hooking engine for ARM architecture☆15Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- ☆85Updated 7 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆67Updated 10 years ago
- ☆137Updated 6 years ago
- ☆38Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆170Updated 7 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- ld-linux code injector☆49Updated 13 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Ambush Host Intrusion Prevention System☆64Updated 11 years ago
- ☆25Updated 11 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆181Updated 7 years ago