a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
☆84May 13, 2019Updated 6 years ago
Alternatives and similar repositories for cachegrab
Users that are interested in cachegrab are comparing it to the libraries listed below
Sorting:
- ☆48Dec 19, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- ☆53Nov 22, 2023Updated 2 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆28Sep 30, 2020Updated 5 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Apr 21, 2022Updated 3 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Aug 13, 2019Updated 6 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- Full TrustZone exploit for MSM8974☆142Jan 24, 2016Updated 10 years ago
- Protecting user secrets from compromised browsers and operating systems☆19Sep 14, 2018Updated 7 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- 整理统计MacOSX的安全补丁与修复的漏洞☆10May 23, 2016Updated 9 years ago
- ☆38Mar 20, 2017Updated 9 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Jun 18, 2016Updated 9 years ago
- Some Proof-of-Concepts of bugs I found☆45Aug 26, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- A basic UNIX shell implementation in C☆34Oct 2, 2019Updated 6 years ago
- Modified shaka-packager☆20Jun 9, 2022Updated 3 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆48Jan 31, 2020Updated 6 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆978Jan 7, 2026Updated 2 months ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 10 years ago
- HiStar operating system (not under active development)☆32Apr 11, 2018Updated 7 years ago
- Verified Boot for RPi3☆15Nov 16, 2021Updated 4 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- ☆136Aug 4, 2022Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year