feat: initial impl of NSA
This commit is contained in:
parent
5ee2c93ceb
commit
990741e4a3
5 changed files with 16 additions and 13 deletions
18
Cargo.lock
generated
18
Cargo.lock
generated
|
@ -186,6 +186,15 @@ version = "0.2.1"
|
|||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "68354c5c6bd36d73ff3feceb05efa59b6acb7626617f4962be322a825e61f79a"
|
||||
|
||||
[[package]]
|
||||
name = "naughty_syscall_auditor"
|
||||
version = "0.1.0"
|
||||
dependencies = [
|
||||
"bindgen 0.64.0",
|
||||
"bindgen 0.69.4",
|
||||
"libc",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "nom"
|
||||
version = "7.1.3"
|
||||
|
@ -196,15 +205,6 @@ dependencies = [
|
|||
"minimal-lexical",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "nosey_syscall_auditor"
|
||||
version = "0.1.0"
|
||||
dependencies = [
|
||||
"bindgen 0.64.0",
|
||||
"bindgen 0.69.4",
|
||||
"libc",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "once_cell"
|
||||
version = "1.19.0"
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
[package]
|
||||
name = "nosey_syscall_auditor"
|
||||
name = "naughty_syscall_auditor"
|
||||
version = "0.1.0"
|
||||
edition = "2021"
|
||||
description = "He's not the messiah, he's a very naughty syscall auditor"
|
||||
|
||||
# build = "build.rs"
|
||||
|
||||
# build = "build.rs"
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
<img src="nsa.png" width="200" height="200" alt="Nosey Syscall Auditor">
|
||||
<img src="nsa.png" width="200" height="200" alt="Naughty Syscall Auditor">
|
||||
|
||||
# Naughty Syscall Auditor
|
||||
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
[toolchain]
|
||||
channel = "1.75"
|
||||
channel = "1.76"
|
||||
components = [ "rustfmt", "rust-src", "cargo", "clippy" ]
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
//! ![NSA](https://raw.githubusercontent.com/sevki/nsa/master/nsa.png)
|
||||
//!
|
||||
//! # NSA: Nosey Syscall Abstractions
|
||||
//! # NSA: Naughty Syscall Abstractions
|
||||
//!
|
||||
//! NSA is a library that allows you to intercept and log system calls.
|
||||
//! It uses the `dlsym` function to get the address of the original function and then calls it. This is a simple way to intercept and log system calls.
|
||||
|
|
Loading…
Reference in a new issue