All Projects → quarkslab → titanm

quarkslab / titanm

Licence: Apache-2.0 license
This repository contains the tools we used in our research on the Google Titan M chip

Programming Languages

c
50402 projects - #5 most used programming language
C++
36643 projects - #6 most used programming language
java
68154 projects - #9 most used programming language
python
139335 projects - #7 most used programming language
CSS
56736 projects
javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to titanm

phuzz
Find exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-64.43%)
Mutual labels:  fuzzing, exploitation
Samsung Trustzone Research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Stars: ✭ 85 (-42.95%)
Mutual labels:  fuzzing, exploitation
AEGPaper
Automatic Exploit Generation Paper
Stars: ✭ 30 (-79.87%)
Mutual labels:  fuzzing, exploitation
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+33.56%)
Mutual labels:  fuzzing, exploitation
Paper collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+376.51%)
Mutual labels:  fuzzing, exploitation
Droid Application Fuzz Framework
Android application fuzzing framework with fuzzers and crash monitor.
Stars: ✭ 248 (+66.44%)
Mutual labels:  fuzzing, exploitation
wordlists
Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
Stars: ✭ 94 (-36.91%)
Mutual labels:  fuzzing
CandyPotato
Pure C++, weaponized, fully automated implementation of RottenPotatoNG
Stars: ✭ 278 (+86.58%)
Mutual labels:  exploitation
MediaTek-Fuzzing-Workshop
MediaTek Fuzzing Workshop in HITCON 2021
Stars: ✭ 59 (-60.4%)
Mutual labels:  fuzzing
awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+1295.3%)
Mutual labels:  fuzzing
StochFuzz
Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
Stars: ✭ 165 (+10.74%)
Mutual labels:  fuzzing
NTU-Computer-Security
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+96.64%)
Mutual labels:  exploitation
ras-fuzzer
RAS(RAndom Subdomain) Fuzzer
Stars: ✭ 42 (-71.81%)
Mutual labels:  fuzzing
afl-dyninst
American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries
Stars: ✭ 65 (-56.38%)
Mutual labels:  fuzzing
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (-11.41%)
Mutual labels:  fuzzing
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-14.77%)
Mutual labels:  exploitation
virgo
Crowdsourced fuzzing cluster. 🚀
Stars: ✭ 21 (-85.91%)
Mutual labels:  fuzzing
bisc
Borrowed Instructions Synthetic Computation
Stars: ✭ 71 (-52.35%)
Mutual labels:  exploitation
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+97.32%)
Mutual labels:  fuzzing
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-38.93%)
Mutual labels:  exploitation

Titan M tools

In this repository, we publish the tools we used in our research on the Google Titan M chip.

We presented our results at Black Hat EU 21 and at the ROOTS workshop within DeepSec.

  • citadelimgloader: the Ghidra loader for Titan M firmware files
  • nugget_toolkit: the set of tools to trace messages and communicate with the chip (including an exploit for a known vulnerability and a fuzzer)
  • bin2rec: a set of scripts used to convert firmware files into rec files that can be used with the SPI rescue feature
  • BHEU_2021: the materials of our presentation at BlackHat Europe 2021 (the slides and the white paper)
  • BHUSA_2022: the materials of our presentation at BlackHat USA 2022

NOTE

This project uses submodules. So after cloning the repository, do not forget to run:

$ git submodule update --init --recursive

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].