pmem / syscall_interceptLinks
The system call intercepting library
☆649Updated 7 months ago
Alternatives and similar repositories for syscall_intercept
Users that are interested in syscall_intercept are comparing it to the libraries listed below
Sorting:
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆798Updated this week
- A minimal kvm example☆495Updated 3 years ago
- libipt - an Intel(R) Processor Trace decoder library☆688Updated last month
- Linux Kernel Sanitizers, fast bug-detectors for the Linux kernel☆461Updated 4 months ago
- A ptrace library for easy syscall injection in Linux.☆182Updated last year
- Tool tracing syscalls in a fast way using eBPF linux kernel feature☆98Updated 2 years ago
- Simple Intel CPU processor tracing on Linux☆349Updated 2 years ago
- KernelMemorySanitizer, a detector of uses of uninitialized memory in the Linux kernel☆416Updated 4 months ago
- Examples for: Learning KVM - implement your own kernel☆379Updated last year
- POSIX Function tracing☆338Updated 8 years ago
- Linux system call fuzzer☆893Updated 11 months ago
- Using ftrace for function hooking in Linux kernel☆279Updated 4 years ago
- Examples for Linux ptrace(2)☆137Updated last year
- Notes on the linux kernel VM subsystem.☆377Updated 2 years ago
- minivm based on kvm☆153Updated last year
- ☆205Updated 3 years ago
- An easy way to virtualize the running system☆350Updated last year
- Intercept a system call using a loadable kernel module.☆58Updated 9 years ago
- Userspace eBPF VM☆911Updated this week
- Test suite for the Linux perf_event subsystem☆118Updated last month
- utilities for Linux ftrace☆298Updated this week
- Stand-alone Native Linux KVM Tool repo☆586Updated 10 months ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆443Updated 3 months ago
- A collection of programs that access and manipulate ELF files.☆609Updated 9 months ago
- A language and library for specifying syscall filtering policies.☆332Updated last year
- Example of how to use the ptrace(2) system call to call a userspace method.☆150Updated 6 years ago
- KVM-based Virtual Machine Introspection☆348Updated 9 months ago
- libcare -- Patch Userspace Code in Live Processes☆153Updated 4 years ago
- system call hook for Linux☆605Updated 7 months ago
- A powerful static binary rewriting tool☆1,049Updated 4 months ago