shentanli's repositories
2048li.github.io
Shentanli's Blog
afl-unicorn
afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.
awesome-offer
关于面试/谈Offer/程序员职场生涯等
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
bc-Knowledge-Base
区块链 Knowledge Base 慢雾安全团队知识库
eos-bp-nodes-security-checklist
EOS bp nodes security checklist(EOS超级节点安全执行指南)
grok-1
Grok open release
how2heap
A repository for learning various heap exploitation techniques.
idamagicstrings
An IDA Python script to extract information from string constants.
idaplugins-list
A list of IDA Plugins
IDAPythonEmbeddedToolkit
IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices
lighthouse
Code Coverage Explorer for IDA Pro & Binary Ninja
linux-exploit-suggester
Linux privilege escalation auditing tool
linux-kernel-exploitation
A bunch of links related to Linux kernel exploitation
linux-vulnerabilities-10-years
My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.
mTower
mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology (e.g., Cortex-M23/33/35p). mTower operates well under restrictions typical for such environment – small RAM and ROM sizes, relatively low performance, absence of rich OSes providing variety of services available on PCs or in enterprise environments. mTower is intended for usage in IoT, embedded devices, Smart Home applications, distributed heterogeneous networks and other environments where secure processing of sensitive data is necessary.
optee_fuzzer
This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.
samsung-trustzone-research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
TinyInjector
Shared Library Injector on Android
tools-images-hikey960
Tools and images for HiKey960
TriforceAFL
AFL/QEMU fuzzing with full-system emulation.
WSL2-Linux-Kernel
The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)