lololosys / awesome-baseband-research
A curated list of awesome baseband research resources
☆161Updated 4 years ago
Alternatives and similar repositories for awesome-baseband-research:
Users that are interested in awesome-baseband-research are comparing it to the libraries listed below
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆160Updated 3 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆152Updated 7 months ago
- Samples of Shannon baseband firmware for research purposes.☆39Updated 3 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆47Updated 3 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆156Updated last year
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆244Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆147Updated 5 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆441Updated last year
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆40Updated 2 years ago
- ☆217Updated last year
- Frida-based general purpose fuzzer☆213Updated 4 years ago
- ☆160Updated 3 years ago
- baseband security research☆84Updated 3 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 3 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆116Updated 3 years ago
- ☆109Updated 11 months ago
- Recent security papers on firmware analysis☆75Updated 3 years ago
- A firmware base address search tool.☆347Updated 4 years ago
- ☆61Updated 3 months ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆184Updated 2 years ago
- ☆186Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆113Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated 10 months ago
- Source code of HAL-fuzz☆143Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- ☆166Updated last week
- A firmware base address search tool.☆44Updated 8 months ago