lololosys / awesome-baseband-researchLinks
A curated list of awesome baseband research resources
☆167Updated 5 years ago
Alternatives and similar repositories for awesome-baseband-research
Users that are interested in awesome-baseband-research are comparing it to the libraries listed below
Sorting:
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆156Updated 11 months ago
- Samples of Shannon baseband firmware for research purposes.☆41Updated 3 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆50Updated 4 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆165Updated last year
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆150Updated 5 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆444Updated last year
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆249Updated 5 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆125Updated 4 years ago
- ☆219Updated 2 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆41Updated 3 years ago
- Frida-based general purpose fuzzer☆217Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆114Updated last year
- ☆186Updated 3 months ago
- ☆160Updated 3 years ago
- baseband security research☆84Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆121Updated 7 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- A PCode Emulator for Ghidra.☆109Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆301Updated 2 years ago
- ☆243Updated 3 years ago
- ☆58Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- A firmware base address search tool.☆353Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆229Updated 5 years ago
- ☆56Updated 7 years ago