Here are
124 public repositories
matching this topic...
chroot, mount --bind, and binfmt_misc without privilege/setup for Linux
🌸 Interactive shellcoding environment to easily craft shellcodes
Updated
Feb 27, 2019
Python
A stupid game for learning about containers, capabilities, and syscalls.
Updated
May 16, 2020
JavaScript
The system call intercepting library
Deep kubernetes visibility from the kubectl
A language and library for specifying syscall filtering policies.
Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.
Inline syscalls made easy for windows on clang
A library for ptrace-based tracing of Python programs
Updated
Mar 1, 2018
Python
KVM-based Virtual Machine Introspection
Updated
Aug 7, 2020
Makefile
Work in progress firewall for Linux syscalls, written in Rust
Updated
Oct 20, 2019
Rust
Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999
A tiny system call tracer and debugger implementation
Experimental system call tracer for Linux x86-64, written in Go
Blazingly fast Linux syscall collector
Updated
Mar 10, 2018
Rust
Tool tracing syscalls in a fast way using eBPF linux kernel feature
Advanced process execution monitoring utility for linux (procmon like)
OCI hook to trace syscalls and generate a seccomp profile
Updated
Aug 12, 2020
Shell
Golang Linux memfd library
Updated
Aug 20, 2018
Python
dock try to re-implement docker 🐳
Some C code i write to study systems programming (while reading The Linux Programming Interface)
Raw system calls for Rust
Updated
Jul 28, 2020
Rust
chroot, mount --bind, and binfmt_misc without privilege/setup for Linux
A suite of tools for disassembly, ROP, and binary analysis written in Go
A lightweight CLI tool that finds system calls being called inside golang applications.
A Go program that uses winmm.dll to record audio to a WAV file.
redirect file open operations via LD_PRELOAD
Improve this page
Add a description, image, and links to the
syscalls
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
syscalls
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
One problem with faulting programs under KRF is that KRF might decide to inject a fault during the dynamic link/load phase, aborting
ld-linux.soinstead of the actual target image. This usually isn't helpful, since it doesn't indicate any mistakes in the target itself.It should be possible to check the loaded program's name via the
currenttask, probably viacomm. We should use that (or