Learning operating system development using Linux kernel and Raspberry Pi
-
Updated
Jul 20, 2020 - C
{{ message }}
Linux is an open source operating system modeled after UNIX. Widely used, it is known for its efficiency and reliability.
Learning operating system development using Linux kernel and Raspberry Pi
Linux Test Project http://linux-test-project.github.io/
My proof-of-concept exploits for the Linux kernel
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86 and x86_64)
Docker/Qemu/Bochs Based Linux 0.11 Kernel Development Environment
RDMA core userspace libraries and daemons
kernel module for taking block-level snapshots and incremental backups of Linux block devices
Various kernel exploits
Linux Application Delivery Controller
Extensible Virtual Display Interface
Tiny library to interface with ALSA in the Linux kernel
Examples for: Learning KVM - implement your own kernel
Prototyping kernel development work outside mainline
XanMod: Linux kernel source code tree
The lttng-tools project provides a session daemon (lttng-sessiond) that acts as a tracing registry, the "lttng" command line for tracing control, a lttng-ctl library for tracing control and a lttng-relayd for network streaming.
Zenpower is Linux kernel driver for reading temperature, voltage(SVI2), current(SVI2) and power(SVI2) for AMD Zen family CPUs.
A pair of kernel modules which provide pools of deduplicated and/or compressed block storage.
Linux Kernel exploitation Tutorial.
Exein core for Linux based firmware
Asynchronous Block-Level Storage Replication
[ KASLD ] Kernel Address Space Layout Derandomization - A collection of various techniques to bypass Linux Kernel Address Space Layout Randomization (KASLR) and retrieve the kernel base virtual address on x86 / x86_64 architectures as an unprivileged local user.
Linux Kernel hooking engine (x86)
A virtual car. Because you wouldn't download a car, would you?
One problem with faulting programs under KRF is that KRF might decide to inject a fault during the dynamic link/load phase, aborting
ld-linux.soinstead of the actual target image. This usually isn't helpful, since it doesn't indicate any mistakes in the target itself.It should be possible to check the loaded program's name via the
currenttask, probably viacomm. We should use that (or