eklitzke / ptrace-call-userspace
Example of how to use the ptrace(2) system call to call a userspace method.
☆149Updated 6 years ago
Alternatives and similar repositories for ptrace-call-userspace
Users that are interested in ptrace-call-userspace are comparing it to the libraries listed below
Sorting:
- A ptrace library for easy syscall injection in Linux.☆177Updated 10 months ago
- Examples for Linux ptrace(2)☆137Updated last year
- Tool tracing syscalls in a fast way using eBPF linux kernel feature☆98Updated 2 years ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆131Updated 7 months ago
- ☆49Updated 4 years ago
- A survey of techniques to hook and/or replace functions in executable binaries or shared libraries☆27Updated 4 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆146Updated 4 years ago
- Function tracer for gcc☆35Updated 8 years ago
- a linux kernel function inline hooking library☆30Updated 7 years ago
- Dump page tables on various OSes and analyze them☆28Updated 9 years ago
- userland exec for Linux x86_64☆67Updated 3 years ago
- Simple Intel CPU processor tracing on Linux☆348Updated 2 years ago
- A minimal toy implementation of strace(1)☆177Updated last year
- Load-time selective binary rewriting☆158Updated 2 years ago
- a quick open/close/ioctl/read/write/free function hooker☆188Updated 8 years ago
- Heap analysis tooling for ptmalloc☆45Updated 2 years ago
- ELF shared library import table patching for function redirection.☆189Updated 4 years ago
- back up from http://people.ee.ethz.ch/~arkeller/linux/kernel_user_space_howto.html☆31Updated 9 years ago
- ☆74Updated 9 years ago
- C++11 ELF/DWARF parser☆78Updated 4 years ago
- POSIX Function tracing☆331Updated 7 years ago
- Fast stack trace utility☆54Updated 6 years ago
- Proof of concept use of linux-inject and proces patching☆39Updated 8 years ago
- A library for GDB (with python support), that adds useful functions to the standard 'gdb' library.☆78Updated 13 years ago
- GDB scripts to add support for low level debugging and reverse engineering☆147Updated 9 years ago
- Print stack traces from running processes, or core files. Supports aarch64, x86_64, and i386☆176Updated last week
- Sample usage of the new memfd_create(2) Linux system call.☆84Updated 4 years ago
- Intercept a system call using a loadable kernel module.☆57Updated 9 years ago
- pahole implementation for gdb☆42Updated 3 years ago
- Linux syscall() injection☆36Updated 4 years ago