ningzhenyu / nailgunLinks
Nailgun attack on ARM devices.
☆164Updated 4 years ago
Alternatives and similar repositories for nailgun
Users that are interested in nailgun are comparing it to the libraries listed below
Sorting:
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- A curated list of awesome baseband research resources☆174Updated 5 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆126Updated 4 years ago
- baseband security research☆84Updated 4 years ago
- ☆53Updated 5 months ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- Recent security papers on firmware analysis☆76Updated 4 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆252Updated 5 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆163Updated 4 years ago
- Fuzzer for Linux Kernel Drivers☆385Updated 3 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆155Updated 7 years ago
- Some tools for testing USB devices☆134Updated 13 years ago
- ☆68Updated last year
- ☆66Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆84Updated last month
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- Janus: a state-of-the-art file system fuzzer on Linux☆231Updated 5 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆57Updated 6 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- NVRAM emulator☆95Updated last year
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆126Updated 5 years ago