Hijacking syscall table address from the MSR IA32_LSTAR register pointer instead of relying on unreliable bruteforce methods, reading /proc/kallsyms or calling kallsyms_lookup_name - View it on GitHub
Star
0
Rank
12126042