Xheni's Wiki
About security stuff and not only.
Books
Online Resources
Cryptography
Application Security
Mobile Security
Penetration Testing
Incident Response
Digital Forensics
Cloud Security
Cyber Threats
Hardware Security
Blockchain
Built with jekyll, made with ❤️ by
Xheni
- 2021.
Hardware Security
WiFi
https://github.com/Tylous/SniffAir
Bluetooth
https://greatscottgadgets.com/ubertoothone/
http://lacklustre.net/bluetooth/
https://github.com/mikeryan/crackle
https://github.com/mikeryan/btcrack
https://github.com/DigitalSecurity/btlejuice
https://github.com/pwnieexpress/blue_hydra
https://github.com/merculite/BLE-Security
https://github.com/s0lst1c3/sentrygun-server
https://github.com/s0lst1c3/sentrygun
https://github.com/evilsocket/bleah
Intel® Software Guard Extensions (SGX)
Trusted Execution Environment (TEE)
http://bits-please.blogspot.ca/
https://googleprojectzero.blogspot.ca/2017/07/trust-issues-exploiting-trustzone-tees.html
Reflections on Trusting TrustZone
https://www.blackhat.com/docs/us-14/materials/us-14-Rosenberg-Reflections-on-Trusting-TrustZone.pdf
https://www.blackhat.com/docs/us-14/materials/us-14-Rosenberg-Reflections-On-Trusting-TrustZone-WP.pdf
Attacking your “Trusted Core” - Exploiting TrustZone on Android
https://www.blackhat.com/docs/us-15/materials/us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android.pdf
https://www.blackhat.com/docs/us-15/materials/us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android-wp.pdf
Fingerprints on Mobile Devices: Abusing And Leaking
https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking.pdf
https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf
https://sensepost.com/blog/2013/a-software-level-analysis-of-trustzone-os-and-trustlets-in-samsung-galaxy-phone/
https://www.op-tee.org/
https://github.com/ARM-software/arm-trusted-firmware
http://sec.cs.ucl.ac.uk/users/smurdoch/talks/rhul14tee.pdf
https://www.cs.ru.nl/E.Poll/papers/TEE.pdf
Internet of Things
https://github.com/adi0x90/attifyos
https://www.chainofthings.com/
https://filament.com/
Others
http://osresearch.net/
https://samy.pl/keysweeper/
Computrace
https://www.ghostlyhaks.com/forum/rom-eeprom-bios-efi-uefi/976-removing-deactivating-computrace
https://www.coresecurity.com/corelabs-research/publications/deactivate-rootkit
https://www.blackhat.com/presentations/bh-usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf
https://www.coresecurity.com/system/files/publications/2016/05/Slides-Deactivate-the-Rootkit-ASacco-AOrtega.pdf
https://bartblaze.blogspot.ca/2014/11/thoughts-on-absolute-computrace.html
https://securelist.com/absolute-computrace-revisited/58278/