Some tee/trustzone helper stuff
☆55Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for tee_research
Users that are interested in tee_research are comparing it to the libraries listed below
Sorting:
- Some collection of router firmware tools☆11Aug 4, 2020Updated 5 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- ☆63Dec 31, 2025Updated 2 months ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆973Jan 7, 2026Updated last month
- An IDA processor for eBPF bytecode☆52Oct 13, 2021Updated 4 years ago
- Frida FDE bruteforce Samsung S7 Edge☆50Nov 4, 2019Updated 6 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆43Jun 15, 2020Updated 5 years ago
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- ☆17Jan 31, 2021Updated 5 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Oct 18, 2022Updated 3 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago
- ☆38Nov 29, 2022Updated 3 years ago
- Some stuff for doing insane qc chipset pwning.☆44Jun 26, 2022Updated 3 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- UNMAINTAINED: I am now developing and using https://github.com/GhidraJupyter/ghidra-jupyter-kotlin instead, PRs still welcome☆16May 6, 2020Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- Official Dexcalibur documentation☆17May 27, 2021Updated 4 years ago
- IDA plugins and scripts for analyzing register usage frame☆181Jun 8, 2023Updated 2 years ago
- Hexagon decompiler for Ghidra☆54Feb 15, 2022Updated 4 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Nov 18, 2019Updated 6 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- This tool automates and facilitates an AES CBC BitFlip attack☆18Jan 17, 2024Updated 2 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago