ghassani / mclf-ghidra-loaderLinks
A Mobicore Trustlet/Driver Binary Loader for Ghidra
☆11Updated 6 years ago
Alternatives and similar repositories for mclf-ghidra-loader
Users that are interested in mclf-ghidra-loader are comparing it to the libraries listed below
Sorting:
- ☆61Updated 6 months ago
- ☆91Updated 2 years ago
- ☆103Updated 5 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- ☆30Updated last year
- baseband security research☆84Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated last year
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 5 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- ☆34Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- ☆31Updated 3 months ago
- A code-searching/completion tool, for IDA APIs☆83Updated 6 months ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Updated 5 years ago
- PoC code for CVE-2017-13253☆37Updated 4 years ago
- android kernel pwn☆20Updated 6 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- CTF Write-ups☆29Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- Worst Android kernel fuzzer☆46Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- ☆58Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 4 years ago