This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the correct cr0 bit.
☆19Jun 2, 2014Updated 11 years ago
Alternatives and similar repositories for Syscall-table-hijack-LKM
Users that are interested in Syscall-table-hijack-LKM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Feb 4, 2020Updated 6 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- Fake TCP protocol in Go☆30Aug 7, 2019Updated 6 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- http://sourceforge.net/projects/strace/☆25Feb 4, 2015Updated 11 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Mar 25, 2026Updated 3 weeks ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- I2P jump service. A sort of slave DNS server for I2P.☆13Feb 24, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A curated list of awesome Dropbox SDKs, open source libraries, and cool tools and services powered by Dropbox.☆15Apr 6, 2016Updated 10 years ago
- ☆38Apr 29, 2018Updated 7 years ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- HD-audio emulator☆22Apr 7, 2021Updated 5 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 10 years ago
- This is a linux rootkit using many of the techniques described on☆166Oct 22, 2019Updated 6 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Mar 22, 2024Updated 2 years ago
- i2p router implementation in C11☆11Nov 14, 2017Updated 8 years ago
- lua bindings for netfilter (nfq for libnetfilter_queue and nfct for libnetfilter_conntrack)☆18Dec 10, 2012Updated 13 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- Shawazu GB Dumper☆19May 16, 2025Updated 11 months ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ALSA library☆13Aug 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- ☆21May 11, 2013Updated 12 years ago
- Tr1d1um is the Webpa micro-service that encode TR-181 requests.☆16Updated this week
- Collection of information and scripts associated with my WWWD DC29 wardriving rig☆14Sep 29, 2021Updated 4 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago