jwilk / ttyjackLinks
proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX
☆35Updated 5 months ago
Alternatives and similar repositories for ttyjack
Users that are interested in ttyjack are comparing it to the libraries listed below
Sorting:
- Utility to execute ELF binary directly from stdin pipe.☆67Updated 2 years ago
- Binary Grep☆45Updated 7 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Standalone portable header-based implementation of FORTIFY_SOURCE=3☆32Updated 2 months ago
- Usage of enabled-by-default hardening-related compiler flags across Linux distributions☆57Updated 7 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆170Updated last year
- Tools for doing upstream Linux kernel development, patch wrangling, builds, and testing☆56Updated this week
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated last year
- ☆46Updated last week
- sandbox demo☆11Updated last year
- ☆42Updated last year
- Explore a live Linux kernel's memory using GDB☆117Updated 2 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- LKRG bypass methods☆73Updated 5 years ago
- ☆27Updated 2 years ago
- Simple syscall sandboxing for Linux☆142Updated last month
- userland exec for Linux x86_64☆67Updated 3 years ago
- usand - convenient and minimal unshare(1)-based sandbox☆67Updated 4 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- OpenBSD unveil(2) like function in Linux using Landlock☆31Updated 4 months ago
- A collection of interesting ELF files for inspiration and testing☆30Updated 2 years ago
- Modify a message to have a desired CRC signature.☆122Updated 4 years ago
- A binary hardening system☆109Updated 2 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Updated 10 months ago
- iTLB multihit PoC☆42Updated last year
- yxd - Yuu's heX Dumper☆89Updated last year
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- Detect if your container is running under a hypervisor☆200Updated 10 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Tool for detecting violations of ordering axioms in qsort/bsearch callbacks.☆54Updated 8 months ago