Generate JSON system call info from Linux source
☆149Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for syscall-table
Users that are interested in syscall-table are comparing it to the libraries listed below
Sorting:
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A collection of slides of the SMT course I held at University of Milan in fall 2011☆10Mar 14, 2015Updated 10 years ago
- Export dwarf debug information from IDA Pro☆215Aug 18, 2022Updated 3 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Jul 30, 2022Updated 3 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 12 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Frontend for MalShare.com☆17Feb 15, 2026Updated 2 weeks ago
- ltrace intercepts and records dynamic library calls which are called by an executed process and the signals received by that process. It …☆129Jan 7, 2011Updated 15 years ago
- IDA Python Scripts☆45Jul 19, 2009Updated 16 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Inject code into a running process☆121Sep 28, 2021Updated 4 years ago
- All architecture and all version of gdbserver.☆31Sep 23, 2022Updated 3 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- GDB commands to aid exploit development☆46Sep 9, 2016Updated 9 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- A Python bytecode compiler and bytecode generator.☆23May 10, 2014Updated 11 years ago
- Public WCSC writeups☆19Sep 18, 2017Updated 8 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Nov 5, 2019Updated 6 years ago
- Functions Catalog☆28Jul 10, 2019Updated 6 years ago
- ☆22Apr 16, 2017Updated 8 years ago
- 娜迦DEX文件修复程序☆25Aug 3, 2017Updated 8 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- API tracing framework for Linux C/C++ applications☆159Jan 29, 2016Updated 10 years ago
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- Example Mac OS X kernel extension that resolves symbols from the running kernel image☆55Mar 7, 2012Updated 13 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Run multiple commands in parallel☆10Apr 20, 2015Updated 10 years ago