This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
training
exploit
hackers
hacking
cybersecurity
penetration-testing
exploits
vulnerability
awesome-list
video-course
hacker
vulnerability-management
vulnerability-identification
vulnerability-scanners
vulnerability-assessment
ethical-hacking
awesome-lists
exploit-development
ethicalhacking
hacking-series
-
Updated
Feb 24, 2020 - Python
we should be able to determine the name of the syscall and the args, based on the abi.
If we assume linux (we shouldn't) we can put this in the arch.
is_syscall
get_syscall_args
are probably the only methods we need to add.
man syscall
to see the abis.Only issue is that we don't know, unless we hardcode, which args are used, unless we backtrack to see which registers were written