hardenedlinux / tzram-audit
ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation
☆21Updated last month
Alternatives and similar repositories for tzram-audit:
Users that are interested in tzram-audit are comparing it to the libraries listed below
- ☆43Updated last year
- A tool to perform so called BGE attack☆24Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated 2 years ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆27Updated last week
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆36Updated 3 weeks ago
- ☆21Updated last year
- IDA Database Importer plugin for Binary Ninja☆37Updated 7 months ago
- ☆16Updated 2 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆40Updated last week
- TrustZone Trusted Application 0-Days by Design☆19Updated 5 months ago
- Binary exploitation by confusing the unwinder☆60Updated 2 years ago
- Qiling Framework Documentation☆16Updated last month
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆32Updated 4 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated last year
- ☆65Updated 6 months ago
- ☆18Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 2 months ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆62Updated last month
- Native Rust bindings for @horsicq's Detect-It-Easy☆13Updated 2 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Diaphora Machine Learning tools and datasets☆20Updated 6 months ago
- Slides from Off-By-One Conferences☆24Updated 7 months ago
- Practical fuzzing tutorials and training☆31Updated 9 months ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆36Updated last year
- Binary Ninja plugin to clean up some common obfuscation techniques.☆20Updated 4 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆30Updated 2 weeks ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago