A small kernel module that can hook arbitrary syscalls on x86_64
☆53Oct 12, 2019Updated 6 years ago
Alternatives and similar repositories for linux-kernel-hook
Users that are interested in linux-kernel-hook are comparing it to the libraries listed below
Sorting:
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Nov 14, 2021Updated 4 years ago
- Linux Kernel hooking engine (x86)☆387Oct 14, 2025Updated 4 months ago
- linux x86_64 and arm64 syscall hook☆22Dec 9, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- 用来辅助分析VB程序的IDA插件☆25Dec 28, 2020Updated 5 years ago
- 使用minifilter编写的透明加解密驱动。☆25Nov 10, 2017Updated 8 years ago
- using gpuz to load driver☆36Mar 14, 2019Updated 6 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- research revolving the windows filtering platform callout mechanism☆39May 26, 2024Updated last year
- Touch Simulation in Golang - Simulate Touch Points using UInput☆36Nov 7, 2025Updated 3 months ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- Deathmatch mod for Quake☆12Jun 3, 2018Updated 7 years ago
- ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions (USENIX ATC'24)☆13Jun 20, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Design and Verification of a Complete Application Specific Integrated Circuit☆12Nov 21, 2016Updated 9 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆46May 22, 2022Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- Dockerized Ethereum testnets☆13Jun 3, 2018Updated 7 years ago
- 暗网爬虫,暗网交易市场爬虫☆11Sep 28, 2021Updated 4 years ago
- Proxy/Delegate Application☆11Mar 12, 2015Updated 10 years ago
- Code/instructions for various slides/demos I've given☆12Oct 27, 2017Updated 8 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- Secure Federated Learning Framework with Encryption Aggregation and Integer Encoding Method.☆10Jul 1, 2024Updated last year
- A simple example of web console☆10Mar 29, 2022Updated 3 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- SIEM, Visibility, and Event-Driven Architecture Curated Solutions. Build a cost-effective threat detection and log management system.☆18Jan 17, 2024Updated 2 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago