|
You are here |
healeycodes.com | ||
| | | | |
nenadnoveljic.com
|
|
| | | | | The current implementation of the eBPF bcc tool killsnoop doesn't capture signals sent by the tgkill() system call. | |
| | | | |
cardaci.xyz
|
|
| | | | | A subtlety of the ptrace system call can be used to prevent a program from being debugged on macOS. | |
| | | | |
binarydebt.wordpress.com
|
|
| | | | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | |
| | | | |
clutterreport.wordpress.com
|
|
| | | attempting to clean up my living and workspace | ||