teesec-research / tckitLinks
☆32Updated 5 years ago
Alternatives and similar repositories for tckit
Users that are interested in tckit are comparing it to the libraries listed below
Sorting:
- trustonic tbase research☆32Updated 7 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- ☆90Updated 3 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- ☆58Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆154Updated 5 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- AFL bindings for Unicorn-Engine☆87Updated last month
- ☆61Updated 10 months ago
- baseband security research☆84Updated 4 years ago
- ☆19Updated 7 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆39Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- ☆25Updated 2 years ago
- ☆14Updated 4 years ago
- ☆34Updated 4 years ago
- blog☆16Updated 5 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆28Updated 6 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆24Updated 2 years ago
- ☆68Updated last year
- ☆41Updated 8 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- ☆31Updated 4 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆83Updated 4 months ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago