ningzhenyu / nailgunView external linksLinks
Nailgun attack on ARM devices.
☆165May 13, 2021Updated 4 years ago
Alternatives and similar repositories for nailgun
Users that are interested in nailgun are comparing it to the libraries listed below
Sorting:
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆971Jan 7, 2026Updated last month
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Some Proof-of-Concepts of bugs I found☆44Aug 26, 2019Updated 6 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- PoC☆211Jan 13, 2025Updated last year
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- xnu kernel heap info leak☆71Nov 21, 2019Updated 6 years ago
- A Kernel fuzzer focusing on race bugs☆378Jul 10, 2019Updated 6 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Mar 28, 2019Updated 6 years ago
- An iOS kernel exploit for iOS 11 through 12.1.2. Non-SMAP (<=A9) devices only.☆80Apr 30, 2019Updated 6 years ago
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- ☆16Jul 20, 2017Updated 8 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Sep 2, 2019Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆157Mar 28, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆171Aug 6, 2020Updated 5 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆17May 19, 2022Updated 3 years ago
- PoC for the iOS 11.4.1 and MacOS 10.13 kernel vulnerability in lio_listio☆78Oct 31, 2018Updated 7 years ago
- ☆400Sep 23, 2021Updated 4 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆350Jul 30, 2024Updated last year
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆49May 11, 2020Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Jun 26, 2021Updated 4 years ago