milabs / staminaLinks
(Linux Kernel) Stack Monitoring Tool
☆45Updated 3 years ago
Alternatives and similar repositories for stamina
Users that are interested in stamina are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆72Updated 5 years ago
- ELF DSO injector☆67Updated last month
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 9 months ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆134Updated 7 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆131Updated 10 months ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- An IDA processor for eBPF bytecode☆34Updated 8 years ago
- ☆92Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Basic BIOS emulator for Unicorn Engine.☆99Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 3 months ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Updated 4 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Heap analysis tooling for dlmalloc☆32Updated 3 years ago