enovella / TEE-reversingLinks
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
☆954Updated last year
Alternatives and similar repositories for TEE-reversing
Users that are interested in TEE-reversing are comparing it to the libraries listed below
Sorting:
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,593Updated last week
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆455Updated last year
- Use angr in Ghidra☆608Updated last year
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆616Updated 9 months ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆664Updated last year
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆816Updated 10 months ago
- Raw binary firmware analysis software☆559Updated last year
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆946Updated 3 years ago
- Python core of avatar²☆558Updated 5 months ago
- kernel-pwn and writeup collection☆652Updated last year
- Python snippets for Ghidra's Program and Decompiler APIs☆836Updated 2 years ago
- A fuzzer for full VM kernel/driver targets☆743Updated 2 months ago
- Android Kernel Exploitation