Trustonic / trustonic-tee-user-spaceLinks
Android user space components for the Trustonic Trusted Execution Environment
☆37Updated 10 years ago
Alternatives and similar repositories for trustonic-tee-user-space
Users that are interested in trustonic-tee-user-space are comparing it to the libraries listed below
Sorting:
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- ☆58Updated 4 years ago
- trustonic tbase research☆32Updated 7 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- ☆41Updated 8 years ago
- ☆31Updated 5 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆41Updated 5 years ago
- Some tee/trustzone helper stuff☆54Updated 6 years ago
- ☆91Updated 2 years ago
- ☆60Updated 8 years ago
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- baseband security research☆85Updated 4 years ago
- ☆61Updated 8 months ago
- Huawei mate 7 TrustZone exploit☆109Updated 10 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 7 years ago
- ☆34Updated 3 years ago
- Hexagon decompiler for Ghidra☆50Updated 3 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Emulating Exynos 4210 BootROM in QEMU☆74Updated 5 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- reversing mtk-su☆16Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆46Updated 5 years ago
- Qualcomm TrustZone kernel privilege escalation☆66Updated 9 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- A firmware base address search tool.☆45Updated last year
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago