ebradbury / linux-syscall-hooker
A Linux kernel module that locates the system call table in memory and hooks uname. Contributions welcome!
☆59Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for linux-syscall-hooker
- ELF obfuscator☆63Updated 9 years ago
- An ELF parsing and manipulation library for Python☆74Updated 10 years ago
- ☆31Updated 8 years ago
- Run android with S2E☆32Updated 9 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆45Updated 7 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- ☆27Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- ☆25Updated 3 years ago
- A small kernel module that can hook arbitrary syscalls on x86_64☆48Updated 5 years ago
- Core of Linux hooking engine for ARM architecture☆22Updated 6 years ago
- A dynamic information flow tracing system for Android☆53Updated 3 years ago
- a linux kernel function inline hooking library☆28Updated 7 years ago
- CVE-2015-3636 exploit☆43Updated 8 years ago
- Dalvik vm Instrumentation OS☆86Updated 8 years ago
- ☆38Updated 8 years ago
- One Python File To Parse ELF For Learning ELF☆22Updated 6 years ago
- gdb plugin for android debugging☆103Updated 8 years ago
- A ptrace library for easy syscall injection in Linux.☆173Updated 4 months ago
- reproduce the experiment in the report.☆27Updated 9 years ago
- Malicious use of ELF such as .so inject, func hook and so on.☆71Updated 7 years ago
- a quick open/close/ioctl/read/write/free function hooker☆186Updated 8 years ago
- ☆55Updated 7 years ago
- cve2014-3153 exploit for ubuntu x86☆17Updated 9 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆41Updated 5 years ago
- ☆22Updated 10 years ago