ningzhenyu / nailgun
Nailgun attack on ARM devices.
☆152Updated 3 years ago
Related projects: ⓘ
- ☆157Updated 2 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆132Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆143Updated 4 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆79Updated 2 months ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆143Updated 6 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆155Updated 3 years ago
- ☆49Updated 5 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆80Updated 5 months ago
- Fuzzer for Linux Kernel Drivers☆367Updated 2 years ago
- CLKscrew Code and Scripts☆25Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆117Updated 4 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 6 years ago
- ☆55Updated 2 years ago
- ☆64Updated 4 years ago
- Janus: a state-of-the-art file system fuzzer on Linux☆207Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆105Updated 7 years ago
- Source code of HAL-fuzz☆137Updated 3 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆133Updated 3 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆293Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆108Updated 3 years ago
- Tool for testing and finding minimal eviction sets☆95Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆212Updated 4 months ago
- ☆64Updated 5 years ago
- K-Miner☆71Updated 5 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆131Updated 11 months ago
- Automated IoT firmware fuzzing framework.☆74Updated 4 years ago
- ☆111Updated 2 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆54Updated 4 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆19Updated 7 years ago