Wrap system calls in Linux
☆31Sep 5, 2014Updated 11 years ago
Alternatives and similar repositories for wrap-syscall
Users that are interested in wrap-syscall are comparing it to the libraries listed below
Sorting:
- ☆25Jul 8, 2015Updated 10 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Backstage Beat is an open-source backend-as-a-service☆14Jun 28, 2016Updated 9 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Feb 27, 2012Updated 14 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- p2p tool providing a reliable ordered duplex stream over udp☆22Feb 17, 2015Updated 11 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- 📐 Backstage Measures in Go☆25Jun 9, 2016Updated 9 years ago
- wip c implementation of dat☆25Sep 18, 2017Updated 8 years ago
- ☆27Sep 10, 2020Updated 5 years ago
- A protobuf plugin to generate parquet schemas.☆13Mar 9, 2022Updated 4 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Remove Hotack Silent SDK Proxy Malware☆26Nov 24, 2025Updated 3 months ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Writeups for my reverse engineering shanenagins☆44Jan 23, 2019Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- IJduino☆15Sep 5, 2016Updated 9 years ago
- A librairie in C for Hexadecimal / Decimal conversion without using stdio.h☆10Oct 24, 2014Updated 11 years ago
- Rolling BB8 character controller for Unity☆12Oct 11, 2022Updated 3 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- ☆11Jun 6, 2016Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Graphlib is a C Library for Graph. Importing this will provide Graph API to extent to applications.☆12Mar 2, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Gzip decoder in Rust☆10May 14, 2017Updated 8 years ago
- Pagemon is an interactive memory/page monitoring tool allowing one to browse the memory map of an active running process.☆48Mar 2, 2026Updated last week