The Wayback Machine - https://web.archive.org/web/20220508135740/https://github.com/topics/syscalls
Here are
179 public repositories
matching this topic...
chroot, mount --bind, and binfmt_misc without privilege/setup for Linux
🌸 Interactive shellcoding environment to easily craft shellcodes
Updated
Feb 26, 2021
Python
A stupid game for learning about containers, capabilities, and syscalls.
Updated
Apr 28, 2022
JavaScript
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
The system call intercepting library
Inline syscalls made easy for windows on clang
Deep kubernetes visibility from the kubectl
A language and library for specifying syscall filtering policies.
KVM-based Virtual Machine Introspection
Updated
Apr 11, 2022
Jinja
Updated
Nov 18, 2019
Makefile
Interact with browser from Go. Manually crafted WebAPI interoperation library.
Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.
Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999
A library for ptrace-based tracing of Python programs
Updated
Feb 16, 2021
Python
OCI hook to trace syscalls and generate a seccomp profile
FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Updated
Feb 22, 2022
Python
Work in progress firewall for Linux syscalls, written in Rust
Updated
Oct 20, 2019
Rust
A fully featured remote pe image injector/loader with forum integration and protection against cracking.
A tiny system call tracer and debugger implementation
Tools and PoCs for Windows syscall investigation.
Advanced process execution monitoring utility for linux (procmon like)
Experimental system call tracer for Linux x86-64, written in Go
Tool tracing syscalls in a fast way using eBPF linux kernel feature
Blazingly fast Linux syscall collector
Updated
Mar 10, 2018
Rust
Raw system calls for Rust
Updated
Mar 24, 2022
Rust
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Golang Linux memfd library
Improve this page
Add a description, image, and links to the
syscalls
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
syscalls
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
One problem with faulting programs under KRF is that KRF might decide to inject a fault during the dynamic link/load phase, aborting
ld-linux.soinstead of the actual target image. This usually isn't helpful, since it doesn't indicate any mistakes in the target itself.It should be possible to check the loaded program's name via the
currenttask, probably viacomm. We should use that (or