pmem / syscall_interceptLinks
The system call intercepting library
☆650Updated 8 months ago
Alternatives and similar repositories for syscall_intercept
Users that are interested in syscall_intercept are comparing it to the libraries listed below
Sorting:
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆800Updated last week
- A minimal kvm example☆497Updated 3 years ago
- libipt - an Intel(R) Processor Trace decoder library☆693Updated 2 months ago
- Simple Intel CPU processor tracing on Linux☆350Updated 2 years ago
- Linux Kernel Sanitizers, fast bug-detectors for the Linux kernel☆463Updated 5 months ago
- KernelMemorySanitizer, a detector of uses of uninitialized memory in the Linux kernel☆417Updated 5 months ago
- POSIX Function tracing☆338Updated 8 years ago
- Using ftrace for function hooking in Linux kernel☆280Updated 4 years ago
- Notes on the linux kernel VM subsystem.☆378Updated 2 years ago
- A ptrace library for easy syscall injection in Linux.☆183Updated last year
- Tool tracing syscalls in a fast way using eBPF linux kernel feature☆98Updated 2 years ago
- Userspace eBPF VM☆919Updated this week
- Linux system call fuzzer☆897Updated 2 weeks ago
- Examples for: Learning KVM - implement your own kernel☆379Updated 2 years ago
- ☆206Updated 3 years ago
- utilities for Linux ftrace☆300Updated 3 weeks ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆446Updated 4 months ago
- Stand-alone Native Linux KVM Tool repo☆587Updated 11 months ago
- KVM-based Virtual Machine Introspection☆349Updated 10 months ago
- Examples for Linux ptrace(2)☆137Updated last year
- Linux Kernel hooking engine (x86)☆365Updated 9 months ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆131Updated 11 months ago
- An easy way to virtualize the running system☆351Updated last year
- minivm based on kvm☆155Updated last year
- Test suite for the Linux perf_event subsystem☆118Updated last month
- Intercept a system call using a loadable kernel module.☆58Updated 9 years ago
- The ERESI Reverse Engineering Software Interface☆570Updated 4 years ago
- Pahole and the dwarves☆243Updated 2 months ago
- Userspace tool to map virtual page addresses to physical addresses.☆188Updated 6 years ago
- libcare -- Patch Userspace Code in Live Processes☆153Updated 4 years ago