Comsecuris / shannonRE
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
☆240Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for shannonRE
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆199Updated 2 years ago
- Some tools for testing USB devices☆127Updated 12 years ago
- ☆138Updated 7 years ago
- A curated list of awesome baseband research resources☆159Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 9 years ago
- Frida-based general purpose fuzzer☆212Updated 4 years ago
- IDA script for highlighting and decoding ARM system instructions☆391Updated 3 years ago
- ☆157Updated 7 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆195Updated 3 months ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆88Updated 9 years ago
- macOS Kernel Fuzzer☆258Updated 7 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆153Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆137Updated 4 years ago
- Samples of Shannon baseband firmware for research purposes.☆38Updated 2 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 7 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆179Updated 6 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆143Updated 4 months ago
- Fuzzer for Linux Kernel Drivers☆371Updated 2 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆244Updated 5 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆232Updated last year
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆151Updated 3 years ago
- ☆84Updated 8 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆147Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago