enovella / TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
☆903Updated 6 months ago
Alternatives and similar repositories for TEE-reversing:
Users that are interested in TEE-reversing are comparing it to the libraries listed below
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆595Updated 3 weeks ago
- Use angr in Ghidra☆564Updated 5 months ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,441Updated this week
- Python core of avatar²☆536Updated last month
- Android Kernel Exploitation☆593Updated 2 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆183Updated 2 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆471Updated 6 months ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆660Updated this week
- This Repository aims at giving a basic idea about Kernel Exploitation.☆503Updated 6 months ago
- A fuzzer for full VM kernel/driver targets☆666Updated this week
- A lightweight dynamic instrumentation library☆1,198Updated 3 weeks ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆429Updated 9 months ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,404Updated 5 months ago
- ☆627Updated this week
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆691Updated 8 months ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆642Updated 9 months ago
- ☆986Updated 10 months ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆602Updated last year
- Project Zero Docs and Tools☆731Updated 2 months ago
- kernel-pwn and writeup collection☆583Updated last year
- repository for kernel exploit practice☆393Updated 5 years ago
- Python snippets for Ghidra's Program and Decompiler APIs☆758Updated last year
- Tools to perform differential fault analysis attacks (DFA).☆313Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆707Updated last month
- Raw binary firmware analysis software☆511Updated 7 months ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆906Updated 2 years ago
- A Coverage Explorer for Reverse Engineers☆2,284Updated 6 months ago
- Driller: augmenting AFL with symbolic execution!☆910Updated 2 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆632Updated 4 months ago
- A powerful static binary rewriting tool☆999Updated this week