This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the correct cr0 bit.
☆19Jun 2, 2014Updated 11 years ago
Alternatives and similar repositories for Syscall-table-hijack-LKM
Users that are interested in Syscall-table-hijack-LKM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆10Feb 14, 2017Updated 9 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Feb 4, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- Fake TCP protocol in Go☆30Aug 7, 2019Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Feb 27, 2012Updated 14 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- I2P jump service. A sort of slave DNS server for I2P.☆13Feb 24, 2022Updated 4 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CR0.CD manipulate Linux Kernel Module as a proc filesystem☆19Jul 29, 2019Updated 6 years ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- HD-audio emulator☆22Apr 7, 2021Updated 4 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Mar 22, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The libmetal module specific for use with Zephyr. This is not a mirror of the official libmetal repo.☆14Nov 6, 2025Updated 4 months ago
- lua bindings for netfilter (nfq for libnetfilter_queue and nfct for libnetfilter_conntrack)☆18Dec 10, 2012Updated 13 years ago
- Medium Access Control layer of 802.15.4☆13Nov 14, 2014Updated 11 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- A benchmark showing that kfifo is really super fast☆11Oct 12, 2015Updated 10 years ago
- ☆21May 11, 2013Updated 12 years ago
- ☆13May 17, 2020Updated 5 years ago
- Collection of information and scripts associated with my WWWD DC29 wardriving rig☆14Sep 29, 2021Updated 4 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- ☆12Apr 1, 2014Updated 11 years ago
- ☆28Mar 22, 2013Updated 13 years ago
- Virtio in userspace☆12Nov 8, 2011Updated 14 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- JTAG Tools For FTDI MPSSE Transports☆13Jul 22, 2014Updated 11 years ago
- The Xmidt server for delivering events written in Go.☆16Mar 19, 2026Updated last week