Comsecuris / shannonRELinks
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
☆250Updated 5 years ago
Alternatives and similar repositories for shannonRE
Users that are interested in shannonRE are comparing it to the libraries listed below
Sorting:
- Some tools for testing USB devices☆134Updated 12 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- A curated list of awesome baseband research resources☆169Updated 5 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆211Updated 3 years ago
- Huawei mate 7 TrustZone exploit☆110Updated 10 years ago
- ☆164Updated 8 years ago
- ☆90Updated 9 years ago
- Frida-based general purpose fuzzer☆219Updated 5 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆156Updated 4 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- ☆57Updated 7 years ago
- ☆140Updated 8 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- BootStomp: a bootloader vulnerability finder☆407Updated 3 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- IDA script for highlighting and decoding ARM system instructions☆401Updated 3 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 9 years ago
- Samples of Shannon baseband firmware for research purposes.☆44Updated 3 years ago
- GDB plugin peda for arm☆146Updated 3 months ago
- IDA cLEMENCy Tools☆62Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆149Updated 7 years ago
- Dynamic security analysis of embedded systems’ firmwares☆83Updated 8 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆249Updated 5 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago