ningzhenyu / nailgunLinks
Nailgun attack on ARM devices.
☆164Updated 4 years ago
Alternatives and similar repositories for nailgun
Users that are interested in nailgun are comparing it to the libraries listed below
Sorting:
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆156Updated 6 years ago
- ☆53Updated 5 months ago
- A curated list of awesome baseband research resources☆174Updated 5 years ago
- ☆163Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- CLKscrew Code and Scripts☆28Updated 5 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆155Updated 7 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆127Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- baseband security research☆84Updated 4 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago
- ☆68Updated last year
- ☆67Updated 5 years ago
- Recent security papers on firmware analysis☆76Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆126Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆385Updated 3 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆84Updated last month
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- Source code of HAL-fuzz☆155Updated 4 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- Writeups for the RHME3 Challenges☆53Updated 6 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- IDA processor module for the hexagon (QDSP6) processor☆236Updated 8 months ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 5 years ago