Comsecuris / shannonRELinks
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
☆249Updated 4 years ago
Alternatives and similar repositories for shannonRE
Users that are interested in shannonRE are comparing it to the libraries listed below
Sorting:
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆208Updated 2 years ago
- Frida-based general purpose fuzzer☆216Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- ☆87Updated 8 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- ☆140Updated 7 years ago
- A curated list of awesome baseband research resources☆167Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆378Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- IDA script for highlighting and decoding ARM system instructions☆399Updated 3 years ago
- Some tools for testing USB devices☆131Updated 12 years ago
- Export dwarf debug information from IDA Pro☆209Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆300Updated 2 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆200Updated 9 months ago
- Function redirection via ELF tricks.☆160Updated 9 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 5 years ago
- ☆54Updated 7 years ago
- Samples of Shannon baseband firmware for research purposes.☆41Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆90Updated 9 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- ☆163Updated 8 years ago
- ☆114Updated 7 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- Symbolic Execution Tool in r2☆105Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- IDA cLEMENCy Tools☆62Updated 7 years ago