milabs / staminaLinks
(Linux Kernel) Stack Monitoring Tool
☆45Updated 3 years ago
Alternatives and similar repositories for stamina
Users that are interested in stamina are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆72Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆44Updated 6 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 6 months ago
- Rootkit Detector for UNIX☆61Updated last year
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- As near as possible to bare metal☆48Updated 2 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆64Updated last month
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆31Updated 6 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆77Updated 4 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆27Updated 6 years ago
- Heap analysis tooling for ptmalloc☆45Updated 2 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Explore a live Linux kernel's memory using GDB☆115Updated 2 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).☆24Updated last year
- Diary of a reverse-engineer blog☆20Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- gopclntab finder and analyzer for Radare2☆20Updated 4 years ago