laginimaineb / fuzz_zoneLinks
Fuzzing utility which enables sending arbitrary SCMs to TrustZone
☆61Updated 9 years ago
Alternatives and similar repositories for fuzz_zone
Users that are interested in fuzz_zone are comparing it to the libraries listed below
Sorting:
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 2 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Updated 9 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 5 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Qualcomm TrustZone kernel privilege escalation☆66Updated 9 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆57Updated 6 years ago
- ☆27Updated 9 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- ☆28Updated 3 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 9 years ago
- An Android port of radamsa fuzzer☆67Updated 5 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- cve-2014-4323 poc☆24Updated 10 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated last year
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Tools for analyzing hexagon code☆39Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- I'll submit the poc after blackhat☆117Updated 10 years ago
- just an experiment☆22Updated 7 years ago
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- Full TrustZone exploit for MSM8974☆141Updated 9 years ago