Trustonic / trustonic-tee-user-spaceView external linksLinks
Android user space components for the Trustonic Trusted Execution Environment
☆39Sep 29, 2015Updated 10 years ago
Alternatives and similar repositories for trustonic-tee-user-space
Users that are interested in trustonic-tee-user-space are comparing it to the libraries listed below
Sorting:
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- An S-Boot fuzzer based on Heimdall☆27Feb 24, 2017Updated 8 years ago
- A tool to dump RAM using S-Boot Upload Mode☆41Feb 26, 2017Updated 8 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- temporary root for the Galaxy S7 Active☆21Nov 28, 2016Updated 9 years ago
- Official QEMU mirror☆29Aug 19, 2025Updated 5 months ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆83May 13, 2019Updated 6 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- ☆108Mar 24, 2020Updated 5 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- collection of evil code☆14Feb 20, 2013Updated 12 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Aug 22, 2022Updated 3 years ago
- Convert WebAssembly binaries to decompilable ELF non-executables☆12Jul 27, 2023Updated 2 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Jul 23, 2020Updated 5 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- The Michelson Symbolic vErifier☆13Feb 3, 2023Updated 3 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Dec 10, 2025Updated 2 months ago
- ☆13Sep 27, 2020Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆971Jan 7, 2026Updated last month
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆17Apr 8, 2023Updated 2 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- reversing mtk-su☆16Mar 4, 2020Updated 5 years ago
- A Telegram cleaning python script☆12Jul 15, 2021Updated 4 years ago
- Unsigned code loader for Exynos BootROM☆119Aug 13, 2020Updated 5 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago