Jim8y / awesome-trustzoneLinks
☆29Updated 2 years ago
Alternatives and similar repositories for awesome-trustzone
Users that are interested in awesome-trustzone are comparing it to the libraries listed below
Sorting:
- Differential fault analysis framework for AES128☆49Updated 12 years ago
- ☆127Updated 3 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆187Updated 3 weeks ago
- Exploit code for CVE-2021-1961☆112Updated 2 years ago
- CLKscrew Code and Scripts☆28Updated 5 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆41Updated 5 years ago
- Trustzone vexpress helloworld example☆18Updated 9 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆949Updated last year
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Updated 9 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- White-box Analysis and Implementation Tools☆75Updated 3 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- An open-source deterministic fault attack simulator prototype☆60Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆117Updated last month
- OP-TEE Sample Applications☆189Updated 3 weeks ago
- Nailgun attack on ARM devices.☆167Updated 4 years ago
- A firmware base address search tool.☆43Updated last year
- ☆56Updated 4 years ago
- ☆24Updated 2 years ago
- trustonic tbase research☆31Updated 7 years ago
- Full TrustZone exploit for MSM8974☆141Updated 9 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆15Updated 5 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 2 years ago
- ☆18Updated 4 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- AFL bindings for Unicorn-Engine☆83Updated last month