Trustonic / trustonic-tee-user-space
Android user space components for the Trustonic Trusted Execution Environment
☆34Updated 9 years ago
Alternatives and similar repositories for trustonic-tee-user-space:
Users that are interested in trustonic-tee-user-space are comparing it to the libraries listed below
- trustonic tbase research☆31Updated 7 years ago
- ☆32Updated 4 years ago
- ☆56Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- ☆40Updated 8 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- ☆55Updated last month
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Updated 9 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆60Updated 9 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- ☆52Updated 7 years ago
- reversing mtk-su☆17Updated 4 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆43Updated 5 years ago
- Emulating Exynos 4210 BootROM in QEMU☆71Updated 5 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Some tee/trustzone helper stuff☆51Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- just an experiment☆21Updated 6 years ago
- ☆27Updated last year
- ☆50Updated last year
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- ☆31Updated 3 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Android Vulnerability Reports and POCs.