rpetrich / callanderLinks
Simple syscall sandboxing for Linux
☆144Updated last month
Alternatives and similar repositories for callander
Users that are interested in callander are comparing it to the libraries listed below
Sorting:
- A stealthy ELF loader - no files, no execve, no RWX☆171Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated last week
- ☆27Updated 2 years ago
- A library for intercepting system calls☆104Updated 11 months ago
- Diff and display virtual machine snapshots☆256Updated 2 years ago
- io_uring based rootkit☆244Updated 7 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆142Updated last month
- A multi-arch assembly REPL and emulator for your command line.☆309Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆178Updated this week
- Ariadne: Binary Ninja Graph Analysis Plugin☆103Updated 10 months ago
- Universal Profiling as a desktop app☆96Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆197Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- 📡🐧 Linux kernel syscall implementation tracker☆238Updated 2 months ago
- eBPF Memory Dump Tool☆94Updated 3 months ago
- sandbox demo☆11Updated last year
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆161Updated 3 months ago
- XZ backdoor reverse engineering☆99Updated last year
- Recover compile-units from stripped binary executables☆57Updated last month
- Quarkslab Bindiffer but not only !☆213Updated 7 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Updated 3 years ago
- Learn to LibAFL with parking-game puzzles.☆74Updated 3 months ago
- ☆89Updated 10 months ago
- Dalvik bytecode disassembler and graph view☆67Updated last year
- ☆45Updated 2 months ago
- Modular and extensible library for Virtual Machine Introspection☆109Updated 4 months ago
- TLS key escrow/interception for debugging☆265Updated last month
- An eBPF playground☆210Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- An implementation of execve() in user space☆33Updated last year