vessial / basebandLinks
baseband security research
☆84Updated 4 years ago
Alternatives and similar repositories for baseband
Users that are interested in baseband are comparing it to the libraries listed below
Sorting:
- ☆90Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- ☆32Updated 5 years ago
- ☆61Updated 10 months ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- ☆58Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 9 months ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆35Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆154Updated 5 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- ☆24Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- trustonic tbase research☆32Updated 7 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- android kernel pwn☆20Updated 6 years ago
- USB device fuzzing on Android Phone☆33Updated 4 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆67Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- ☆32Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆28Updated 6 years ago
- ☆32Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- blog☆16Updated 5 years ago
- ☆106Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 6 years ago