laginimaineb / fuzz_zone
Fuzzing utility which enables sending arbitrary SCMs to TrustZone
☆60Updated 9 years ago
Alternatives and similar repositories for fuzz_zone:
Users that are interested in fuzz_zone are comparing it to the libraries listed below
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆53Updated 8 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Qualcomm TrustZone kernel privilege escalation☆62Updated 8 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆26Updated 4 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆117Updated 5 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆34Updated 9 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- ☆27Updated 8 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- Full TrustZone exploit for MSM8974☆139Updated 9 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆74Updated 9 years ago
- ☆25Updated 6 years ago
- ☆32Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- ☆38Updated 8 years ago
- just an experiment☆21Updated 6 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆64Updated 5 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 8 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- ☆49Updated 8 years ago