teesec-research / tckit
☆32Updated 4 years ago
Alternatives and similar repositories for tckit:
Users that are interested in tckit are comparing it to the libraries listed below
- trustonic tbase research☆31Updated 7 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- ☆89Updated 2 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- ☆22Updated 2 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- ☆27Updated last year
- ☆32Updated 3 years ago
- ☆55Updated 2 months ago
- ☆13Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆56Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆35Updated 9 years ago
- ☆19Updated 6 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Samples of Shannon baseband firmware for research purposes.☆39Updated 3 years ago
- baseband security research☆85Updated 3 years ago
- ☆51Updated 10 months ago
- ☆23Updated last year
- android kernel pwn☆19Updated 6 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆36Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆47Updated 8 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- ☆28Updated last year
- ☆46Updated 3 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆42Updated 4 years ago
- Driver Security Analyzer☆51Updated 4 years ago