kaist-hacking / BaseCompLinks
BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
☆20Updated 2 years ago
Alternatives and similar repositories for BaseComp
Users that are interested in BaseComp are comparing it to the libraries listed below
Sorting:
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆51Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆23Updated 10 months ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Samples of Shannon baseband firmware for research purposes.☆46Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆47Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- A firmware base address search tool.☆47Updated last year
- baseband security research☆84Updated 4 years ago
- ☆14Updated 7 months ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆78Updated 11 months ago
- ☆69Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated last year
- ☆24Updated 3 years ago
- Hexagon decompiler for Ghidra☆52Updated 3 years ago
- AFL bindings for Unicorn-Engine☆87Updated 3 months ago
- ☆32Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆84Updated last month
- ☆41Updated 5 years ago
- ☆35Updated 4 years ago
- ☆19Updated 6 months ago
- nanoMIPS module for Ghidra☆53Updated last month
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆21Updated 2 years ago