enovella / TEE-reversingView external linksLinks
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
☆971Jan 7, 2026Updated last month
Alternatives and similar repositories for TEE-reversing
Users that are interested in TEE-reversing are comparing it to the libraries listed below
Sorting:
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Android Kernel Exploitation☆638Feb 13, 2022Updated 4 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆344Aug 23, 2019Updated 6 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆537Apr 23, 2024Updated last year
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,681Jan 27, 2026Updated 2 weeks ago
- ☆330Jun 20, 2024Updated last year
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Jun 26, 2021Updated 4 years ago
- some vul☆789Apr 25, 2025Updated 9 months ago
- A Coverage Explorer for Reverse Engineers☆2,497Updated this week
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,725Jan 14, 2026Updated last month
- A collection of links related to Linux kernel security and exploitation☆6,346Jan 26, 2026Updated 3 weeks ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆856Jun 4, 2020Updated 5 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆457Feb 7, 2024Updated 2 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆833Aug 22, 2025Updated 5 months ago
- Tiny cute emulator plugin for IDA based on unicorn.☆1,226Aug 13, 2024Updated last year
- Android/Linux vmlinux loader☆352Nov 18, 2023Updated 2 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆354Jan 10, 2021Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- ☆134Aug 4, 2022Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆440Apr 11, 2025Updated 10 months ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆180Jul 13, 2023Updated 2 years ago
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆839Jan 5, 2026Updated last month
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- Karta - source code assisted fast binary matching plugin for IDA☆901May 13, 2023Updated 2 years ago
- Project Zero Docs and Tools☆840Feb 4, 2026Updated last week
- A Trace Explorer for Reverse Engineers☆1,514Oct 23, 2023Updated 2 years ago
- Raw binary firmware analysis software☆567Jun 6, 2024Updated last year
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆350Jul 30, 2024Updated last year
- A True Instrumentable Binary Emulation Framework☆5,807Nov 5, 2025Updated 3 months ago
- A list of my CVE's with POCs☆680Dec 15, 2020Updated 5 years ago