samanbarghi / wrap-syscallView external linksLinks
Wrap system calls in Linux
☆31Sep 5, 2014Updated 11 years ago
Alternatives and similar repositories for wrap-syscall
Users that are interested in wrap-syscall are comparing it to the libraries listed below
Sorting:
- ☆25Jul 8, 2015Updated 10 years ago
- Fast and efficient binary translator☆58Jan 17, 2019Updated 7 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Backstage Beat is an open-source backend-as-a-service☆14Jun 28, 2016Updated 9 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Apr 1, 2018Updated 7 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Feb 27, 2012Updated 13 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- 📐 Backstage Measures in Go☆25Jun 9, 2016Updated 9 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- wip c implementation of dat☆25Sep 18, 2017Updated 8 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- A protobuf plugin to generate parquet schemas.☆13Mar 9, 2022Updated 3 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Writeups for my reverse engineering shanenagins☆44Jan 23, 2019Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Graphlib is a C Library for Graph. Importing this will provide Graph API to extent to applications.☆12Mar 2, 2018Updated 7 years ago
- Bridge between OTel and KEDA api☆12Feb 7, 2026Updated last week
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- IJduino☆15Sep 5, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- ☆11Jun 6, 2016Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- NOVA Microhypervisor☆11Feb 6, 2026Updated last week
- ☆12Feb 8, 2021Updated 5 years ago
- ☆34Aug 9, 2022Updated 3 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- ☆35Jul 13, 2016Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago