Pinned Repositories
ARM-assembly-examples
Snippets from ARM assembly tutorials
ARM-challenges
Protostart Stack Overflow Challenges compiled for ARMv6.
Arm-firmware-emulation
Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not straight-forward to emulate.
Belkin-F9K1122v1-Exploit
Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation
mclf-ghidra-loader
Ghidra loader module for the Mobicore trustlet and driver binaries
owasp-mstg
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.
rotator
Small script to determine valid immediate values for ARM assembly
trustonic-tee-driver
Android driver for the Trusted Execution Environment <t-base
mclf-ghidra-loader
Ghidra loader module for the Mobicore trustlet and driver binaries
azeria-labs's Repositories
azeria-labs/ARM-assembly-examples
Snippets from ARM assembly tutorials
azeria-labs/ARM-challenges
Protostart Stack Overflow Challenges compiled for ARMv6.
azeria-labs/Arm-firmware-emulation
Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not straight-forward to emulate.
azeria-labs/rotator
Small script to determine valid immediate values for ARM assembly
azeria-labs/Belkin-F9K1122v1-Exploit
Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation
azeria-labs/owasp-mstg
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.
azeria-labs/trustonic-tee-driver
Android driver for the Trusted Execution Environment <t-base
azeria-labs/mclf-ghidra-loader
Ghidra loader module for the Mobicore trustlet and driver binaries