duasynt / gdb_scripts
☆56Updated 4 years ago
Alternatives and similar repositories for gdb_scripts:
Users that are interested in gdb_scripts are comparing it to the libraries listed below
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- trustonic tbase research☆31Updated 7 years ago
- ☆56Updated 3 months ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 3 months ago
- ☆32Updated 4 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Driver Security Analyzer☆51Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆41Updated 3 years ago
- Making Type Info Library (TIL) file for Apache modules☆55Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- baseband security research☆84Updated 4 years ago
- ☆89Updated 2 years ago
- android kernel pwn☆19Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- AFL bindings for Unicorn-Engine☆77Updated last week
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆85Updated 2 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆38Updated last year
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- QEMU with support for QDSP6 user mode emulation☆32Updated 5 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆123Updated last year
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year