This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demonstration, as well as the defense overhead evaluation.
☆34Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for ret2ns-Cortex-M-TrustZone
Users that are interested in ret2ns-Cortex-M-TrustZone are comparing it to the libraries listed below
Sorting:
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- ☆26Nov 16, 2023Updated 2 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Rust library for parsing a number of firmware images☆14Feb 22, 2023Updated 3 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Overview of Secure-Launch process on Qualcomm devices☆68Jan 27, 2024Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Microarchitectural weird machine implementation using exceptions, TSX, branch predictors, and branch target buffers.☆17May 24, 2023Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- CacheFlow is a Linux kernel module that exposes the contents of the last-level cache on *most* ARM machines.☆17Jun 19, 2024Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆17Jul 30, 2023Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- ☆20Dec 4, 2023Updated 2 years ago
- ☆57Oct 22, 2025Updated 4 months ago
- ☆23Mar 6, 2023Updated 2 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- ☆24Nov 22, 2020Updated 5 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☆29Jan 25, 2022Updated 4 years ago
- CHERI-RISC-V model written in Sail☆65Jul 10, 2025Updated 7 months ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- pdb downloader☆31Feb 27, 2024Updated 2 years ago
- A Crystal Palace shared library to resolve & perform syscalls☆57Oct 29, 2025Updated 4 months ago
- ☆24Apr 18, 2021Updated 4 years ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 6 months ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- Bump your ida python script automatically!☆31Apr 19, 2025Updated 10 months ago
- Pishi is a code coverage tool like kcov for macOS.☆75Apr 17, 2025Updated 10 months ago
- ☆71May 12, 2025Updated 9 months ago
- ☆11May 17, 2024Updated last year