hardenedlinux / tzram-auditLinks
ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation
☆23Updated 10 months ago
Alternatives and similar repositories for tzram-audit
Users that are interested in tzram-audit are comparing it to the libraries listed below
Sorting:
- ☆51Updated last year
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 2 weeks ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆96Updated this week
- A tool to perform so called BGE attack☆26Updated 6 months ago
- ☆26Updated last year
- ☆31Updated 2 months ago
- AFL bindings for Unicorn-Engine☆87Updated 3 months ago
- weggli ruleset scanner for source code and binaries☆35Updated last month
- ☆21Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 11 months ago
- QuarkslaB Dynamic Linker library☆89Updated last year
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- ☆52Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆73Updated 7 months ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Updated last year
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 7 months ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆78Updated last year
- nanoMIPS module for Ghidra☆54Updated 2 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆127Updated last year
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- Practical fuzzing tutorials and training☆31Updated last year
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last year
- ☆22Updated 3 years ago
- ☆39Updated 5 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆102Updated this week
- breaking decompilers☆55Updated 7 months ago
- ☆76Updated last year
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆124Updated 2 months ago