Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: ArmExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.