SALT – SLUB ALlocator Tracer for the Linux Kernel

Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit, to debug your own kernel code, and, more importantly, to play with the kernel heap allocations and learn its inner workings.

This tool helps tracing allocations and the current state of the SLUB allocator in modern linux kernels.

It is written as a gdb plugin, and it allows you to trace and record memory allocations and to filter them by process name or by cache. The tool can also dump the list of active caches and print relevant information.

This repository also includes a playground loadable kernel module that can trigger allocations and deallocations at will, to serve both as a debugging tool and as a learning tool to better understand how the allocator works.

Also Read : Beef : The Browser Exploitation Framework Project

Here is the full list of commands:

salt help
Possible commands:
filter — manage filtering features by adding with one of the following arguments
enable — enable filtering. Only information about filtered processes will be displayed
disable — disable filtering. Information about all processes will be displayed.
status — display current filtering parameters
add process/cache — add one or more filtering conditions
remove process/cache — remove one or more filtering conditions
set — specify complex filtering rules. The supported syntax is “salt filter set (cache1 or cache2) and (process1 or process2)”.
Some variations might be accepted. Checking with “salt filter status” is recommended. For simpler rules use “salt filter add”.
record — manage recording features by adding with one of the following arguments
on — enable recording. Information about filtered processes will be added to the history
off — disable recording.
show — display the recorded history
clear — delete the recorded history
trace — reset all filters and configure filtering for a specific process
walk — navigate all active caches and print relevant information
walk_html — navigate all active caches and generate relevant information in html format
walk_json — navigate all active caches and generate relevant information in json format
help — display this message

And here you can see salt in action:

Credit : YanickFabioEmanueleDarioMarius

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

9 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

9 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago