Trust Zone Project
☆21Jan 6, 2015Updated 11 years ago
Alternatives and similar repositories for arm-trustzone
Users that are interested in arm-trustzone are comparing it to the libraries listed below
Sorting:
- Trusted Execution Environment - Secure kernel leveraging ARM's TrustZone isolation☆21Feb 6, 2014Updated 12 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆85Dec 2, 2013Updated 12 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Making the examples code of "The Definitive Guide to the Xen Hypervisor" work with Xen-4.2 or above☆34Dec 10, 2013Updated 12 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 12 years ago
- A solver for GCHQ's christmas card puzzle☆12Dec 14, 2015Updated 10 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Picon☆39Apr 16, 2017Updated 8 years ago
- ☆73Apr 30, 2020Updated 5 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Ratel - a new framework for instruction-level interposition on enclaved applications☆25Dec 14, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆127Jan 11, 2018Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- A Tamarin model and analysis of EMV☆36Feb 8, 2021Updated 5 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Aug 4, 2022Updated 3 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Python list cutter tool☆35Mar 2, 2016Updated 10 years ago
- ZX Basic ZX Spectrum Game Maker☆20Feb 19, 2026Updated 2 weeks ago
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- This github repository hosts the code used within my thesis work and my last publication.☆12Jul 20, 2017Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Alsa and tinyalsa plugins for the parameter-framework☆11Mar 30, 2017Updated 8 years ago
- pre-release.☆12Jul 15, 2015Updated 10 years ago
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Mass Parallel Secure Shell command execution☆12Nov 9, 2025Updated 3 months ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago