ghassani / mclf-ghidra-loaderLinks
A Mobicore Trustlet/Driver Binary Loader for Ghidra
☆11Updated 6 years ago
Alternatives and similar repositories for mclf-ghidra-loader
Users that are interested in mclf-ghidra-loader are comparing it to the libraries listed below
Sorting:
- Some tee/trustzone helper stuff☆53Updated 5 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 5 years ago
- ☆103Updated 5 years ago
- ☆90Updated 2 years ago
- ☆30Updated last year
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆60Updated 6 months ago
- ☆31Updated 3 months ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 2 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- baseband security research☆84Updated 4 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆28Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Magellan PoC☆34Updated 6 years ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30Updated 6 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Worst Android kernel fuzzer☆46Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated last year
- reversing mtk-su☆17Updated 5 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆67Updated 4 years ago