yasukata / zpoline
system call hook for Linux
☆495Updated last month
Related projects ⓘ
Alternatives and complementary repositories for zpoline
- 📡🐧 Linux kernel syscall implementation tracker☆197Updated this week
- eBPF verifier based on abstract interpretation☆391Updated this week
- Userspace eBPF runtime for Observability, Network & General Extensions Framework☆829Updated 3 weeks ago
- sloader is an ELF loader which aims to replace ld-linux.so of glibc.☆141Updated last year
- Userspace eBPF VM☆833Updated this week
- Investigate kernel error call stacks☆209Updated last month
- High-performance QEMU memory and instruction tracing☆527Updated 3 months ago
- Reference setup for Linux kernel development in VSCode☆203Updated 6 months ago
- Using ftrace for function hooking in Linux kernel☆253Updated 3 years ago
- The system call intercepting library☆632Updated 10 months ago
- Quickly build and run kernels inside a virtualized snapshot of your live system☆458Updated 3 weeks ago
- 🌐🐧 Browsable linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆146Updated last month
- blazesym is a library for address symbolization and related tasks☆118Updated this week
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆549Updated 4 months ago
- Userspace eBPF VM with llvm JIT/AOT compiler☆53Updated 2 months ago
- minivm based on kvm☆143Updated 5 months ago
- An eBPF program debugger☆197Updated 2 years ago
- Linux Kernel hooking engine (x86)☆333Updated 6 months ago
- A powerful static binary rewriting tool☆983Updated 3 months ago
- Explore a live Linux kernel's memory using GDB☆113Updated 2 years ago
- An easy way to virtualize the running system☆332Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆151Updated last month
- Generate eBPF programs and tracing with ChatGPT☆225Updated 3 months ago
- An experimental AOT compiler that translates Linux ELF binary to WebAssembly☆165Updated this week
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆237Updated 3 weeks ago
- Dectect syscall hooking using eBPF☆139Updated last year
- Information about Linux system calls on different architectures☆140Updated this week
- Sample ebpf programs to analyze☆91Updated last week
- KVM-based Virtual Machine Introspection☆314Updated 2 weeks ago
- ☆427Updated 3 months ago