Advanced process execution monitoring utility for linux (procmon like)
-
Updated
Mar 4, 2016 - C
Advanced process execution monitoring utility for linux (procmon like)
This project is aimed to control the socket connection by hijacking the syscall table, configure file is in JSON format and transferred into kernel by netlink.
An example rootkit that gives a userland process root permissions
Add No read up no write down security model functionality to Linux - Course Project of Operating Systems Instructed by Prof. R. Jalili - Spring 2020
Dump syscall numbers from ntdll.dll
🌸 Interactive shellcoding environment to easily craft shellcodes
This Linux module discovers the memory positioning of the Linux system_call_table
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
Assignment done in Operating System Course in IIITD
This a repository containing use of Linux Scheduling policies for three threads, three process. The last part includes a simple syscall implementation in Linux.
Inline syscalls made for MSVC supporting x64 and WOW64
I created r2-syscall-printer (radare r2pipe script) because I need now Linux-kernel interface call convention support (x86 & x86_64): %rdi, %rsi, %rdx, %r10, %r8, %r9. Also you can use this tool as standalone-app to print syscall table info
A framework to track the evolution of Operating Systems over time
System call interception in linux-kernel module (kernel 2.6.34.7-61.fc13.x86_64)
The "ftrace" project at Epitech is a function tracing tool developed in C that allows for analyzing function calls, system calls, and signals received by a running program on x86_64 Linux systems.
A very simple NTDLL fetcher & syscall number extractor
📡🐧 Linux kernel syscall implementation tracker
Add a description, image, and links to the syscall-table topic page so that developers can more easily learn about it.
To associate your repository with the syscall-table topic, visit your repo's landing page and select "manage topics."