hardenedlinux / tzram-auditLinks
ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation
☆21Updated 3 months ago
Alternatives and similar repositories for tzram-audit
Users that are interested in tzram-audit are comparing it to the libraries listed below
Sorting:
- ☆44Updated last year
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆47Updated this week
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- ☆21Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆31Updated this week
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- A tool to perform so called BGE attack☆24Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- ☆18Updated 3 years ago
- trustonic tbase research☆31Updated 7 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 8 months ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆63Updated last week
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆29Updated last year
- ☆13Updated 2 years ago
- ☆28Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- weggli ruleset scanner for source code and binaries☆29Updated last week
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆65Updated 3 years ago
- ☆22Updated 2 years ago
- breaking decompilers☆47Updated 3 weeks ago
- Binary Only Thread Sanitizer☆14Updated 9 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆39Updated this week
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- Practical fuzzing tutorials and training☆30Updated 10 months ago