darx0r / poke
ptrace poke command-line tool
☆14Updated 5 years ago
Alternatives and similar repositories for poke:
Users that are interested in poke are comparing it to the libraries listed below
- wrapper library for the functionality offered by ptrace. features facilities to enter breakpoint, debug and hook syscalls, etc.☆21Updated 3 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- UNIX domain socket tracing LD_PRELOAD wrapper, mirror from git://git.gnumonks.org/udtrace☆49Updated 5 years ago
- Modifies running processes on Linux☆24Updated 2 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- Kernel function hooking using exception tables☆27Updated 6 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 8 years ago
- Python module to check for system call numbers☆11Updated last year
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- Utility for dumping all the information Capstone has on given instructions.☆24Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- blocking socket library with SSL, SOCKS/HTTP proxy chaining, and timeout☆40Updated 3 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 4 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆13Updated last year
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 5 months ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- A collection of shellcodes☆68Updated 12 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- ☆55Updated 7 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- X86/X64/ARM/MIPS Assembler/Disassembler/Decomposer Library☆37Updated 5 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago