ghassani / mclf-ida-loaderView external linksLinks
An IDA file loader for Mobicore trustlet and driver binaries
☆60Jan 21, 2020Updated 6 years ago
Alternatives and similar repositories for mclf-ida-loader
Users that are interested in mclf-ida-loader are comparing it to the libraries listed below
Sorting:
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- Official QEMU mirror☆30Aug 19, 2025Updated 5 months ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆43Jun 15, 2020Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆94Aug 6, 2018Updated 7 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Feb 5, 2019Updated 7 years ago
- ☆23Jun 29, 2017Updated 8 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- An S-Boot fuzzer based on Heimdall☆27Feb 24, 2017Updated 8 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆971Jan 7, 2026Updated last month
- A tool to dump RAM using S-Boot Upload Mode☆41Feb 26, 2017Updated 8 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- CTF challs and writeups from CNSS.☆18Feb 15, 2020Updated 5 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- ☆134Aug 4, 2022Updated 3 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆22Jul 8, 2022Updated 3 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- Unsigned code loader for Exynos BootROM☆119Aug 13, 2020Updated 5 years ago
- Debugger for the Shannon Baseband☆58Jun 15, 2020Updated 5 years ago
- ☆63Aug 26, 2017Updated 8 years ago
- IDA script for highlighting and decoding ARM system instructions☆405Sep 28, 2021Updated 4 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Dec 12, 2016Updated 9 years ago
- ☆18May 18, 2018Updated 7 years ago
- ☆47Aug 12, 2019Updated 6 years ago
- Farm root is a root for android devices using the dirty cow vulnerability☆23Oct 29, 2016Updated 9 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 6 years ago
- EsoLangVM Compiler Infrastructure☆11Jul 31, 2024Updated last year
- ☆10Dec 26, 2023Updated 2 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 10 months ago
- ☆23Nov 18, 2025Updated 2 months ago