PRoot is a user-space implementation of "chroot", "mount --bind", and "binfmt_misc". This means that users don't need any privilege or setup to do things like: using an arbitrary directory as the new root filesystem, making files accessible somewhere else in the filesystem hierarchy, or executing
... [More] programs built for another CPU architecture transparently through QEMU user-mode. Also, developers can add their own features or use PRoot as a Linux process instrumentation engine thanks to its extension mechanism. Technically PRoot relies on "ptrace", an unprivileged system-call available in every Linux kernel. [Less]
Fakeroot Next Gen uses the debugger (PTRACE) interface to trick a program into thinking it is running as root. The basic concept is the same as with fakeroot, but the different interface allows more control over the tricked program, allowing fakeroot-ng to go where fakeroot would not.
Simple tracing tool for linux.
Should aid during exploiting, cracking, finding memory regions and patching.
Cross-Platform x86, x64 and ARM Linux
Debugger aimed at patching memory and keeping an eye on variables. Enables you to inject code in the running process Et cetera, Et cetera..
python-ptrace is a debugger using ptrace (Linux, BSD and Darwin system call to trace processes) written in Python.
python-ptrace is an opensource project (contribute!) written in Python under GNU GPLv2 license.
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy