Skip to content

hooking the execve syscall, to randomly sabotage typed bash commands.

License

Notifications You must be signed in to change notification settings

ilevi-code/syscall_hooks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Syscall hooks

A small project of hooking the execve() syscall, to randomly sabotage typed bash commands. This project was tested on 5.11.0-38-generic.

Usage

Before building the project, make sure to update the sys_call_table address in hooks.c with the value of following command

$ sudo cat /proc/kallsyms | grep ' sys_call_table$'

To build and load simply execute

$ make && sudo insmod sabotage.ko

About

hooking the execve syscall, to randomly sabotage typed bash commands.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published