jwilk / ttyjackLinks
proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX
☆36Updated 3 months ago
Alternatives and similar repositories for ttyjack
Users that are interested in ttyjack are comparing it to the libraries listed below
Sorting:
- Utility to execute ELF binary directly from stdin pipe.☆67Updated 2 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated 8 months ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Binary Grep☆45Updated 7 years ago
- ☆46Updated 2 months ago
- iTLB multihit PoC☆41Updated last year
- Simple syscall sandboxing for Linux☆137Updated last week
- userland exec for Linux x86_64☆67Updated 3 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆120Updated this week
- usand - convenient and minimal unshare(1)-based sandbox☆66Updated 4 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- ☆27Updated 2 years ago
- Usage of enabled-by-default hardening-related compiler flags across Linux distributions☆57Updated 5 months ago
- Explore a live Linux kernel's memory using GDB☆115Updated 2 years ago
- ☆42Updated last year
- A binary hardening system☆109Updated last year
- sandbox demo☆11Updated last year
- Some useful LD_PRELOAD libraries☆12Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- Standalone portable header-based implementation of FORTIFY_SOURCE=3☆29Updated last week
- XZ backdoor reverse engineering☆98Updated last year
- Minimal RarVM Toolchain☆234Updated 10 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 8 months ago