trustonic tbase research
☆32Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for tbase
Users that are interested in tbase are comparing it to the libraries listed below
Sorting:
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- kilroy☆39Jun 23, 2014Updated 11 years ago
- Official QEMU mirror☆29Aug 19, 2025Updated 6 months ago
- ☆26Nov 8, 2023Updated 2 years ago
- An S-Boot fuzzer based on Heimdall☆27Feb 24, 2017Updated 9 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- AFLplusplus + libprotobuf-mutator☆61Nov 7, 2022Updated 3 years ago
- ☆32Oct 13, 2025Updated 4 months ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- ☆11Sep 12, 2021Updated 4 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- ☆13Nov 9, 2022Updated 3 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Dec 10, 2025Updated 2 months ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- ☆63Dec 31, 2025Updated 2 months ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆973Jan 7, 2026Updated last month
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 9 months ago
- ☆103Nov 20, 2022Updated 3 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Aug 22, 2022Updated 3 years ago
- Unsigned code loader for Exynos BootROM☆118Aug 13, 2020Updated 5 years ago
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆15Jun 8, 2022Updated 3 years ago
- ☆65Aug 11, 2021Updated 4 years ago
- A tool to dump RAM using S-Boot Upload Mode☆41Feb 26, 2017Updated 9 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆124Sep 3, 2021Updated 4 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆235Jun 19, 2020Updated 5 years ago
- Run TrustZone TAs outside the secure world.☆17Oct 14, 2025Updated 4 months ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆83Feb 21, 2022Updated 4 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago