avk7vk / arm-trustzoneView external linksLinks
Trust Zone Project
☆21Jan 6, 2015Updated 11 years ago
Alternatives and similar repositories for arm-trustzone
Users that are interested in arm-trustzone are comparing it to the libraries listed below
Sorting:
- Trusted Execution Environment - Secure kernel leveraging ARM's TrustZone isolation☆21Feb 6, 2014Updated 12 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆85Dec 2, 2013Updated 12 years ago
- Making the examples code of "The Definitive Guide to the Xen Hypervisor" work with Xen-4.2 or above☆34Dec 10, 2013Updated 12 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 8 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 12 years ago
- A solver for GCHQ's christmas card puzzle☆12Dec 14, 2015Updated 10 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Picon☆39Apr 16, 2017Updated 8 years ago
- ☆73Apr 30, 2020Updated 5 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Ratel - a new framework for instruction-level interposition on enclaved applications☆25Dec 14, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Linux call graph visualization☆28Jul 16, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- BOLOS community enclave for SGX & simulator☆36Feb 2, 2020Updated 6 years ago
- A Tamarin model and analysis of EMV☆36Feb 8, 2021Updated 5 years ago
- Dark Mozila Firefox Theme for Firefox 57+☆12Oct 17, 2019Updated 6 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Aug 4, 2022Updated 3 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- Python list cutter tool☆35Mar 2, 2016Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 10 years ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- ☆10Jan 28, 2013Updated 13 years ago
- VLESS-XTLS-uTLS-REALITY setup script.☆11May 3, 2023Updated 2 years ago
- Mass Parallel Secure Shell command execution☆12Nov 9, 2025Updated 3 months ago
- This github repository hosts the code used within my thesis work and my last publication.☆12Jul 20, 2017Updated 8 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Sild is a lisp dialect☆43Nov 17, 2025Updated 2 months ago
- pre-release.☆12Jul 15, 2015Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago