Comsecuris / shannonRE
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
☆244Updated 4 years ago
Alternatives and similar repositories for shannonRE:
Users that are interested in shannonRE are comparing it to the libraries listed below
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆203Updated 2 years ago
- A curated list of awesome baseband research resources☆161Updated 4 years ago
- Frida-based general purpose fuzzer☆213Updated 4 years ago
- ☆140Updated 7 years ago
- ☆84Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Some tools for testing USB devices☆129Updated 12 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆139Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆147Updated 5 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- GDB plugin peda for arm☆145Updated last month
- IDA script for highlighting and decoding ARM system instructions☆393Updated 3 years ago
- ☆122Updated 6 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Samples of Shannon baseband firmware for research purposes.☆39Updated 3 years ago
- Symbolic Execution Tool in r2☆104Updated 3 years ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 6 years ago
- macOS Kernel Fuzzer☆258Updated 7 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆198Updated 6 months ago
- ☆114Updated 7 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆181Updated 6 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- Function redirection via ELF tricks.☆157Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆53Updated 8 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆225Updated 4 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆160Updated 3 years ago