quarkslab / samsung-trustzone-researchView external linksLinks
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
☆158Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for samsung-trustzone-research
Users that are interested in samsung-trustzone-research are comparing it to the libraries listed below
Sorting:
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆971Jan 7, 2026Updated last month
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆43Jun 15, 2020Updated 5 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- ☆171Aug 6, 2020Updated 5 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆235Jun 19, 2020Updated 5 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆854Jun 4, 2020Updated 5 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Aug 22, 2022Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆86Oct 15, 2020Updated 5 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Aug 12, 2021Updated 4 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Jun 26, 2021Updated 4 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆344Aug 23, 2019Updated 6 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- kernel exploit for Apple iOS 13.X☆185Nov 27, 2020Updated 5 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- A set of tools for fuzzing SecureROM. Managed to find and trigger checkm8.☆164Sep 18, 2021Updated 4 years ago
- Lightweight toolkit to explore and modify address translation for ARM64.☆43Jul 25, 2021Updated 4 years ago
- ☆146Aug 17, 2022Updated 3 years ago
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- IDA Pro plugin to recovery static Thumb2 symbols.☆12Sep 14, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Sep 11, 2021Updated 4 years ago
- Debugger for the Shannon Baseband☆58Jun 15, 2020Updated 5 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆354Jan 10, 2021Updated 5 years ago
- ☆352Aug 29, 2024Updated last year
- September Chrome 1day by István Kurucsai☆82Sep 9, 2019Updated 6 years ago
- An IDAPython module for enhancing c++ support on top of ida_kernelcache☆140May 15, 2025Updated 9 months ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆175Jul 2, 2024Updated last year
- 安卓内核提权漏洞分析☆492Apr 27, 2019Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- ☆108Mar 24, 2020Updated 5 years ago
- slides for conference talks☆105Jul 27, 2025Updated 6 months ago