Inline syscalls made easy for windows on clang
-
Updated
Jun 14, 2022 - C++
Inline syscalls made easy for windows on clang
Advanced Game Hacking Library for C/C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64/ARM/ARM64) (DLL/SO Injection) (Internal/External)
A wrapper library around native windows sytem APIs
system call hook for Linux
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
📡🐧 Linux kernel syscall implementation tracker
A manual system call library that supports functions from both ntdll.dll and win32u.dll
Tool tracing syscalls in a fast way using eBPF linux kernel feature
A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]
An example rootkit that gives a userland process root permissions
For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.
Generate a variety of suspect actions that are detected by Falco rulesets
Add a description, image, and links to the syscall topic page so that developers can more easily learn about it.
To associate your repository with the syscall topic, visit your repo's landing page and select "manage topics."