nccgroup / cachegrabLinks
a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
☆80Updated 6 years ago
Alternatives and similar repositories for cachegrab
Users that are interested in cachegrab are comparing it to the libraries listed below
Sorting:
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆243Updated 7 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- Linux Kernel Source Tree Reducer☆80Updated 7 months ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- ☆76Updated 7 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- ☆28Updated 2 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆68Updated 11 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- ☆55Updated 2 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆150Updated 5 years ago
- Qualcomm TrustZone kernel privilege escalation☆63Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆120Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago