{"id":30035029,"url":"https://github.com/cybersecurity-dev/awesome-linux-system-programming","last_synced_at":"2025-08-07T01:02:21.878Z","repository":{"id":308437374,"uuid":"1032821382","full_name":"cybersecurity-dev/awesome-linux-system-programming","owner":"cybersecurity-dev","description":"Awesome Linux System Programming","archived":false,"fork":false,"pushed_at":"2025-08-05T22:14:56.000Z","size":6,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-08-06T00:11:46.933Z","etag":null,"topics":["awesome","awesome-list","awesome-lists","linux-system-programming","system-programming"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"cc0-1.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-08-05T22:06:24.000Z","updated_at":"2025-08-05T22:25:08.000Z","dependencies_parsed_at":"2025-08-06T00:21:53.226Z","dependency_job_id":null,"html_url":"https://github.com/cybersecurity-dev/awesome-linux-system-programming","commit_stats":null,"previous_names":["cybersecurity-dev/awesome-linux-system-programming"],"tags_count":null,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/awesome-linux-system-programming","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-linux-system-programming","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-linux-system-programming/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-linux-system-programming/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-linux-system-programming/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/awesome-linux-system-programming/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-linux-system-programming/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":269181055,"owners_count":24373853,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-08-06T02:00:09.910Z","response_time":99,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["awesome","awesome-list","awesome-lists","linux-system-programming","system-programming"],"created_at":"2025-08-07T01:00:58.136Z","updated_at":"2025-08-07T01:02:21.833Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":null,"readme":"# Awesome [Linux](https://docs.kernel.org/core-api/kernel-api.html) [System](https://en.wikipedia.org/wiki/Systems_programming) [Programming](https://en.wikipedia.org/wiki/System_programming_language) [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)\n[![Linux](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge\u0026logo=linux\u0026logoColor=black)](https://man7.org/tlpi/toc-short.html)\n\n\u003cp align=\"center\"\u003e\n    \u003ca href=\"https://github.com/cybersecurity-dev/\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/github.svg\" alt=\"GitHub\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://www.youtube.com/@CyberThreatDefence\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/youtube.svg\" alt=\"YouTube\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://cyberthreatdefence.com/my_awesome_lists\"\u003e\u003cimg height=\"20\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/blog.svg\" alt=\"My Awesome Lists\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/bar.gif\"\u003e\n\u003c/p\u003e\n\n\n\n| Reference | Topics | Example |\n|--------|:------:|:-------:|\n| 1 | System Programming Concepts | link |\n| 2 | File I/O: The Universal I/O Model | link |\n| 3 | File I/O: Further Details | link |\n| 4 | Processes | link |\n| 5 | Memory Allocation | link |\n| 6 | Users and Groups | link |\n| 7 | Process Credentials | link |\n| 8 | Times and Dates | link |\n| 9 | System Limits and Options | link |\n| 10 | Retrieving System and Process Information | link |\n| 11 | File I/O Buffering | link |\n| 12 | File Systems | link |\n| 13 | File Attributes | link |\n| 14 | Extended Attributes | link |\n| 15 | Access Control Lists | link |\n| 16 | Directories and Links | link |\n| 17 | Monitoring File Events with inotify | link |\n| 18 | Signals: Fundamental Concepts | link |\n| 19 | Signals: Signal Handlers | link |\n| 20 | Signals: Advanced Features | link |\n| 21 | Timers and Sleeping | link |\n| 22 | Process Creation | link |\n| 23 | Process Termination | link |\n| 24 | Monitoring Child Processes | link |\n| 25 | Program Execution | link |\n| 26 | Process Creation and Program Execution in More Detail | link |\n| 27 | Threads: Introduction | link |\n| 28 | Threads: Thread Synchronization | link |\n| 29 | Threads: Thread Safety and Per-thread Storage | link |\n| 30 | Threads: Thread Cancellation | link |\n| 31 | Threads: Further Details | link |\n| 32 | Process Groups, Sessions, and Job Control | link |\n| 33 | Process Priorities and Scheduling | link |\n| 34 | Process Resources | link |\n| 35 | Daemons | link |\n| 36 | Writing Secure Privileged Programs | link |\n| 37 | Capabilities | link |\n| 38 | Login Accounting | link |\n| 39 | Fundamentals of Shared Libraries | link |\n| 40 | Advanced Features of Shared Libraries | link |\n| 41 | Interprocess Communication Overview | link |\n| 42 | Pipes and FIFOs | link |\n| 43 | Introduction to System V IPC | link |\n| 44 | System V Message Queues | link |\n| 45 | System V Semaphores | link |\n| 46 | System V Shared Memory | link |\n| 47 | Memory Mappings | link |\n| 48 | Virtual Memory Operations | link |\n| 49 | Introduction to POSIX IPC | link |\n| 50 | POSIX Message Queues | link |\n| 51 | POSIX Semaphores | link |\n| 52 | POSIX Shared Memory | link |\n| 53 | File Locking | link |\n| 54 | Sockets: Introduction | link |\n| 55 | Sockets: Unix Domain | link |\n| 56 | Sockets: Fundamentals of TCP/IP Networks | link |\n| 57 | Sockets: Internet Domains | link |\n| 58 | Sockets: Server Design | link |\n| 59 | Sockets: Advanced Topics | link |\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fawesome-linux-system-programming","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Fawesome-linux-system-programming","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fawesome-linux-system-programming/lists"}