mingw-w64-uvwasi
|
0.0.19-2 |
1 |
0.00
|
WASI syscall API built atop libuv (mingw-w64) |
andrewkoz
|
2023-09-27 04:48 (UTC) |
syzkaller-git
|
r5884.79264ae39-1 |
1 |
0.00
|
a distributed, unsupervised, coverage-guided Linux syscall fuzzer |
anatolik
|
2021-01-03 18:01 (UTC) |
systemf
|
1.11-1 |
1 |
0.00
|
A brainfuck interpreter supporting Linux syscalls |
karlguy
|
2017-06-05 01:17 (UTC) |
strace-grace
|
0.0.1-1 |
0 |
0.00
|
grace is a tool for monitoring and annotating syscalls for a given process. It's essentially a lightweight strace, in Go, with colours and pretty output. |
slava.ganzin
|
2022-11-17 13:45 (UTC) |
python-pysendfile
|
2.0.1-9 |
0 |
0.00
|
A Python interface to sendfile(2) syscall |
orphan
|
2024-02-26 19:54 (UTC) |
python-linuxfd
|
1.5-2 |
0 |
0.00
|
Bindings for the Linux eventfd/signalfd/timerfd/inotify syscalls |
bcb
|
2023-05-18 18:45 (UTC) |
procmon-git
|
1.0.1.r8.gc75bf1b-1 |
1 |
0.00
|
Trace syscall activity tool |
Chocobo1
|
2023-04-10 09:13 (UTC) |
procmon
|
1.0.1-1 |
1 |
0.00
|
Trace syscall activity tool |
Chocobo1
|
2021-05-06 04:16 (UTC) |
nsjail-git
|
r836.e0c13f5-1 |
1 |
0.00
|
A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language) |
bsdice
|
2018-03-13 20:50 (UTC) |
libsyscall
|
0.1.3-1 |
0 |
0.00
|
A library providing all of the assembly code needed for a C standard library |
celskeggs
|
2017-02-11 09:40 (UTC) |
libseccomp-git
|
2.5.4.r126.gf1c3196-1 |
5 |
0.00
|
Interface to the Linux Kernel's syscall filtering mechanism |
Chocobo1
|
2023-09-20 17:26 (UTC) |
latrace
|
0.5.11-2 |
2 |
0.00
|
trace library calls and get their statistics in a manner similar to the strace utility (syscall tracing) |
severach
|
2017-07-02 18:44 (UTC) |
iamroot-s390x
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (s390x) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-riscv64
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (riscv64) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-powerpc64le
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (powerpc64le) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-mipsle
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (mipsle) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-armhf
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (armhf) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-arm
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (arm) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-aarch64_be
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (aarch64_be) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot-aarch64
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process (aarch64) |
gportay
|
2024-04-09 19:30 (UTC) |
iamroot
|
21-1 |
0 |
0.00
|
Emulating the syscall chroot(2) in an unpriviliged process |
gportay
|
2024-04-09 19:29 (UTC) |