Jim8y / awesome-trustzoneLinks
☆28Updated 2 years ago
Alternatives and similar repositories for awesome-trustzone
Users that are interested in awesome-trustzone are comparing it to the libraries listed below
Sorting:
- ☆125Updated 2 years ago
- Exploit code for CVE-2021-1961☆111Updated 2 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Updated 9 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- Widevine Key Ladder in Python3☆42Updated 3 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆103Updated 3 years ago
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13Updated 7 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- Trustzone vexpress helloworld example☆18Updated 9 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆94Updated 3 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆929Updated 11 months ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆90Updated 6 years ago
- trustonic tbase research☆31Updated 7 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- MediaTek BP firmware tools☆57Updated last year
- ☆9Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆38Updated 4 years ago
- ☆32Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆183Updated this week
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆120Updated 5 years ago
- Full TrustZone exploit for MSM8974☆139Updated 9 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- ☆41Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆14Updated 4 years ago
- A proxy library between Chromium browser and WidevineCDM library.☆30Updated 4 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆63Updated last year
- baseband security research☆84Updated 4 years ago