This Linux module discovers the memory positioning of the Linux system_call_table
-
Updated
Jun 12, 2021 - C
This Linux module discovers the memory positioning of the Linux system_call_table
Add No read up no write down security model functionality to Linux - Course Project of Operating Systems Instructed by Prof. R. Jalili - Spring 2020
This project is aimed to control the socket connection by hijacking the syscall table, configure file is in JSON format and transferred into kernel by netlink.
Dump syscall numbers from ntdll.dll
System call interception in linux-kernel module (kernel 2.6.34.7-61.fc13.x86_64)
An example rootkit that gives a userland process root permissions
Advanced process execution monitoring utility for linux (procmon like)
Add a description, image, and links to the syscall-table topic page so that developers can more easily learn about it.
To associate your repository with the syscall-table topic, visit your repo's landing page and select "manage topics."