jwilk / ttyjack
proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX
☆34Updated 3 weeks ago
Alternatives and similar repositories for ttyjack:
Users that are interested in ttyjack are comparing it to the libraries listed below
- usand - convenient and minimal unshare(1)-based sandbox☆63Updated 4 years ago
- userland exec for Linux x86_64☆67Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- iTLB multihit PoC☆40Updated last year
- OpenBSD unveil(2) like function in Linux using Landlock☆25Updated last month
- A stealthy ELF loader - no files, no execve, no RWX☆161Updated last year
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated last year
- Utility to execute ELF binary directly from stdin pipe.☆65Updated 2 years ago
- ☆45Updated last year
- A minimal, resource-friendly syslog daemon for embedded Linux☆26Updated 2 years ago
- Explore a live Linux kernel's memory using GDB☆114Updated 2 years ago
- ☆26Updated 2 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆18Updated 5 months ago
- A collection of interesting ELF files for inspiration and testing☆27Updated 2 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 5 months ago
- EFI Byte Code Virtual Machine in userspace☆77Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆31Updated last year
- Tools for doing upstream Linux kernel development, patch wrangling, builds, and testing☆53Updated last month
- A binary hardening system☆107Updated last year
- This project has been merged into virtme-ng☆14Updated 3 months ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆67Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆58Updated last year
- A collection of ideas for new kernel features☆54Updated 6 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- Binary Grep☆44Updated 7 years ago
- A system call interception tool☆56Updated 4 months ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago