Android user space components for the Trustonic Trusted Execution Environment
☆38Sep 29, 2015Updated 10 years ago
Alternatives and similar repositories for trustonic-tee-user-space
Users that are interested in trustonic-tee-user-space are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- A tool to dump RAM using S-Boot Upload Mode☆41Feb 26, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An S-Boot fuzzer based on Heimdall☆28Feb 24, 2017Updated 9 years ago
- temporary root for the Galaxy S7 Active☆21Nov 28, 2016Updated 9 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆159Dec 16, 2019Updated 6 years ago
- Official QEMU mirror☆30Aug 19, 2025Updated 7 months ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆125Aug 13, 2019Updated 6 years ago
- reversing mtk-su☆17Mar 4, 2020Updated 6 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆234Jun 19, 2020Updated 5 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆982Jan 7, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Sep 8, 2020Updated 5 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated 2 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- ☆109Mar 24, 2020Updated 6 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 3 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Aug 22, 2022Updated 3 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Driver Security Analyzer☆52Oct 27, 2020Updated 5 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆86May 13, 2019Updated 6 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- Some Proof-of-Concepts of bugs I found☆45Aug 26, 2019Updated 6 years ago
- ☆14Sep 27, 2020Updated 5 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆25Dec 9, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 9 months ago
- Debugger for the Shannon Baseband☆59Jun 15, 2020Updated 5 years ago
- Import Device Tree Information onto your Ghidra memory map☆34Updated this week
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Jul 23, 2020Updated 5 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago