HenryHoggard / Awesome Arm Exploitation
A collection of awesome videos, articles, books and resources about ARM exploitation.
Stars: ✭ 125
Projects that are alternatives of or similar to Awesome Arm Exploitation
hardware-attacks-state-of-the-art
Microarchitectural exploitation and other hardware attacks.
Stars: ✭ 29 (-76.8%)
Mutual labels: arm, exploitation
Arm exploitation
Exploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (+11.2%)
Mutual labels: arm, exploitation
Exploit me
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (+432%)
Mutual labels: arm, exploitation
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (+0%)
Mutual labels: exploitation
Gitlab
GitLab CE (Docker image) for ARM devices, this is a mirror repository of
Stars: ✭ 121 (-3.2%)
Mutual labels: arm
Raspberry Pi Os
Learning operating system development using Linux kernel and Raspberry Pi
Stars: ✭ 11,000 (+8700%)
Mutual labels: arm
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-8.8%)
Mutual labels: exploitation
Docker Homebridge
Homebridge Docker. HomeKit support for the impatient using Docker on x86_64, Raspberry Pi (armhf) and ARM64. Includes ffmpeg + libfdk-aac.
Stars: ✭ 1,847 (+1377.6%)
Mutual labels: arm
Keystone
Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
Stars: ✭ 1,654 (+1223.2%)
Mutual labels: arm
Maplesyrup
Assesses CPU security of embedded devices. #nsacyber
Stars: ✭ 121 (-3.2%)
Mutual labels: arm
Azops
This container image can be used to deploy ARM templates at Tenant, Management Group, Subscription and Resource Group scope and export current Azure configuration hierarchy in Git repository.
Stars: ✭ 109 (-12.8%)
Mutual labels: arm
Arm Vo
Efficient monocular visual odometry for ground vehicles on ARM processors
Stars: ✭ 115 (-8%)
Mutual labels: arm
Shimonbox
Semi-automatically generated 3D printable cases for development boards using OpenSCAD
Stars: ✭ 120 (-4%)
Mutual labels: arm
Shuriken
Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-8.8%)
Mutual labels: exploitation
Mmusiccast
Chromecast emulator that works on any platform. Stream videos from youtube to raspberry pi or any computer with the chromecast protocol.
Stars: ✭ 113 (-9.6%)
Mutual labels: arm
Awesome ARM Exploitation
A collection of awesome videos, articles, books, tools and resources about ARM exploitation.
Contents
- Conference Talks / Videos
- Articles / Papers
- Resources
- CTF / Training Binaries
- Books
- Tools
- Courses
- Related Awesome Lists
- Contributing
Conference Talks / Videos
- Exploitation on ARM - Itzhak Avraham - Defcon 18 (2010)
- ARM Exploitation ROPMAP - Long Le - Blackhat USA (2011)
- Advanced ARM Exploitation - Stephen Ridley & Stephen Lawler - Blackhat USA (2012)
- ARM Assembly and Shellcode Basics - Saumil Shah - 44CON (2017)
- Heap Overflow Exploits for Beginners (ARM Exploitation Tutorial) - Billy Ellis (2017)
- Introduction to Exploitation on ARM64 - Billy Ellis - Codetalks (2018)
- Make ARM Shellcode Great Again - Saumil Shah - Hack.lu (2018)
- ARM Memory Tagging, how it improves C++ memory safety - Kostya Serebryany - LLVM (2018)
- Breaking Samsung's ARM Trustzone
- Hacker Nightmares: Giving Hackers a Headache with Exploit Mitigations - Azeria - Virtual Arm Research Summit (2020)
Articles / Papers
- ARM Assembly Basics Series - Azeria
- ARM Binary Exploitation Series - Azeria
- Smashing the ARM Stack - Mercked Security
- Introduction to ARMv8 64-bit Architecture - pnuic
- Alphanumeric RISC ARM Shellcode - (Phrack) - Yves Younan, Pieter Philippaerts
- Return-Oriented Programming on a Cortex-M Processor
- 3or ARM Exploitation Series - Dimitrios Slamaris
- Developing StrongARM/Linux Shellcode - (Phrack) - funkysh
- Reversing and Exploiting ARM Binaries - Mathy Vanhoef
- ARM Exploitation for IoT Series - Andrea Sindoni
- Reverse Engineering of ARM Microcontrollers - Rdomanski
- ARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow - HighAltitudeHacks
Resources
CTF / Training Binaries
Books
- Practical Reverse Engineering (Chapter 2) - Bruce Dang, Alexandre Gazet and Elias Bachalany
- Beginners Guide to Exploitation on ARM - Volumes 1 & 2 - Billy Ellis
- ARM Assembly Language: Fundamentals & Techniques - William Hohl
Tools
Courses
- Azeria ARM Training
- Pentest Academy ARM Assembly
- Pentest Academy Reverse Engineering for ARM Platforms
- IHackArm Offensive ARM Exploitation
Related Awesome Lists
Contributing
Your contributions are always welcome!
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].