148 lines
6.5 KiB
HTML
148 lines
6.5 KiB
HTML
<h1 id="awesome-arm-exploitation">Awesome ARM Exploitation</h1>
|
||
<p><a href="https://github.com/sindresorhus/awesome"><img
|
||
src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg"
|
||
alt="Awesome" /></a></p>
|
||
<p>A collection of awesome videos, articles, books, tools and resources
|
||
about ARM exploitation.</p>
|
||
<h2 id="contents">Contents</h2>
|
||
<ul>
|
||
<li><a href="#conference-talks--videos">Conference Talks /
|
||
Videos</a></li>
|
||
<li><a href="#articles--papers">Articles / Papers</a></li>
|
||
<li><a href="#resources">Resources</a></li>
|
||
<li><a href="#ctf--training-binaries">CTF / Training Binaries</a></li>
|
||
<li><a href="#books">Books</a></li>
|
||
<li><a href="#tools">Tools</a></li>
|
||
<li><a href="#courses">Courses</a></li>
|
||
<li><a href="#related-awesome-lists">Related Awesome Lists</a></li>
|
||
<li><a href="#contributing">Contributing</a></li>
|
||
</ul>
|
||
<h2 id="conference-talks-videos">Conference Talks / Videos</h2>
|
||
<ul>
|
||
<li><a href="https://www.youtube.com/watch?v=kykVyJ0dm8Y">Exploitation
|
||
on ARM</a> - Itzhak Avraham - Defcon 18 (2010)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=VDyf_tJ8IUg">ARM
|
||
Exploitation ROPMAP</a> - Long Le - Blackhat USA (2011)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=gdsPydfBfSA">Advanced ARM
|
||
Exploitation</a> - Stephen Ridley & Stephen Lawler - Blackhat USA
|
||
(2012)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=BhjJBuX0YCU">ARM Assembly
|
||
and Shellcode Basics</a> - Saumil Shah - 44CON (2017)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=L8Ya7fBgEzU">Heap Overflow
|
||
Exploits for Beginners (ARM Exploitation Tutorial)</a> - Billy Ellis
|
||
(2017)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=xVyH68HFsQU">Introduction
|
||
to Exploitation on ARM64</a> - Billy Ellis - Codetalks (2018)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=9tx293lbGuc">Make ARM
|
||
Shellcode Great Again</a> - Saumil Shah - Hack.lu (2018)</li>
|
||
<li><a href="https://www.youtube.com/watch?v=iP_iHroclgM">ARM Memory
|
||
Tagging, how it improves C++ memory safety</a> - Kostya Serebryany -
|
||
LLVM (2018)</li>
|
||
<li><a
|
||
href="https://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf">Breaking
|
||
Samsung’s ARM Trustzone</a></li>
|
||
<li><a href="https://www.youtube.com/watch?v=riQ-WyYrxh4">Hacker
|
||
Nightmares: Giving Hackers a Headache with Exploit Mitigations</a> -
|
||
Azeria - Virtual Arm Research Summit (2020)</li>
|
||
</ul>
|
||
<h2 id="articles-papers">Articles / Papers</h2>
|
||
<ul>
|
||
<li><a href="https://azeria-labs.com/writing-arm-assembly-part-1/">ARM
|
||
Assembly Basics Series</a> - Azeria</li>
|
||
<li><a href="https://azeria-labs.com/writing-arm-shellcode/">ARM Binary
|
||
Exploitation Series</a> - Azeria</li>
|
||
<li><a
|
||
href="https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1">Smashing
|
||
the ARM Stack</a> - Mercked Security</li>
|
||
<li><a
|
||
href="https://quequero.org/2014/04/introduction-to-arm-architecture/">Introduction
|
||
to ARMv8 64-bit Architecture</a> - pnuic</li>
|
||
<li><a href="http://phrack.org/issues/66/12.html">Alphanumeric RISC ARM
|
||
Shellcode</a> - (Phrack) - Yves Younan, Pieter Philippaerts</li>
|
||
<li><a
|
||
href="https://ieeexplore.ieee.org/document/8029521">Return-Oriented
|
||
Programming on a Cortex-M Processor</a></li>
|
||
<li><a
|
||
href="https://blog.3or.de/arm-exploitation-return-oriented-programming.html">3or
|
||
ARM Exploitation Series</a> - Dimitrios Slamaris</li>
|
||
<li><a href="http://www.phrack.com/issues/58/10.html">Developing
|
||
StrongARM/Linux Shellcode</a> - (Phrack) - funkysh</li>
|
||
<li><a
|
||
href="http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html">Reversing
|
||
and Exploiting ARM Binaries</a> - Mathy Vanhoef</li>
|
||
<li><a
|
||
href="https://quequero.org/2017/07/arm-exploitation-iot-episode-1/">ARM
|
||
Exploitation for IoT Series</a> - Andrea Sindoni</li>
|
||
<li><a
|
||
href="https://rdomanski.github.io/Reverse-engineering-of-ARM-Microcontrollers/">Reverse
|
||
Engineering of ARM Microcontrollers</a> - Rdomanski</li>
|
||
<li><a
|
||
href="http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/">ARM64
|
||
Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap
|
||
Overflow</a> - HighAltitudeHacks</li>
|
||
</ul>
|
||
<h2 id="resources">Resources</h2>
|
||
<ul>
|
||
<li><a
|
||
href="http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.subset.architecture.reference/index.html">ARM
|
||
Architecture Reference Manual</a></li>
|
||
<li><a href="https://azm.azerialabs.com/">Online ARM Assembler</a></li>
|
||
<li><a href="https://github.com/enovella/TEE-reversing">ARM TEE
|
||
Reversing and Exploitation</a></li>
|
||
</ul>
|
||
<h2 id="ctf-training-binaries">CTF / Training Binaries</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/bkerler/exploit_me">Exploit Me</a></li>
|
||
<li><a href="https://github.com/Billy-Ellis/Exploit-Challenges">Exploit
|
||
Challenges</a></li>
|
||
<li><a
|
||
href="https://azeria-labs.com/emulate-raspberry-pi-with-qemu/">Azeria
|
||
ARM Lab</a></li>
|
||
</ul>
|
||
<h2 id="books">Books</h2>
|
||
<ul>
|
||
<li><a
|
||
href="https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311">Practical
|
||
Reverse Engineering</a> (Chapter 2) - Bruce Dang, Alexandre Gazet and
|
||
Elias Bachalany</li>
|
||
<li><a href="https://zygosec.com/book.html">Beginners Guide to
|
||
Exploitation on ARM</a> - Volumes 1 & 2 - Billy Ellis</li>
|
||
<li><a
|
||
href="https://www.amazon.co.uk/ARM-Assembly-Language-Fundamentals-Techniques/dp/1439806101">ARM
|
||
Assembly Language: Fundamentals & Techniques</a> - William Hohl</li>
|
||
</ul>
|
||
<h2 id="tools">Tools</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/sashs/Ropper">Ropper</a></li>
|
||
</ul>
|
||
<h2 id="courses">Courses</h2>
|
||
<ul>
|
||
<li><a href="https://training.azeria-labs.com/">Azeria ARM
|
||
Training</a></li>
|
||
<li><a href="https://www.pentesteracademy.com/course?id=46">Pentest
|
||
Academy ARM Assembly</a></li>
|
||
<li><a href="https://www.pentesteracademy.com/course?id=49">Pentest
|
||
Academy Reverse Engineering for ARM Platforms</a></li>
|
||
<li><a href="https://ihackarm.com/">IHackArm Offensive ARM
|
||
Exploitation</a></li>
|
||
</ul>
|
||
<h2 id="related-awesome-lists">Related Awesome Lists</h2>
|
||
<ul>
|
||
<li><a
|
||
href="https://github.com/ashishb/android-security-awesome">Awesome
|
||
Android Security</a></li>
|
||
<li><a
|
||
href="https://github.com/ashishb/osx-and-ios-security-awesome">Awesome
|
||
iOS Security</a></li>
|
||
<li><a href="https://github.com/nebgnahz/awesome-iot-hacks">Awesome IoT
|
||
Hacks</a></li>
|
||
<li><a
|
||
href="https://github.com/FabioBaroni/awesome-exploit-development">Awesome
|
||
Exploit Development</a></li>
|
||
</ul>
|
||
<h2 id="contributing"><a href="CONTRIBUTING.md">Contributing</a></h2>
|
||
<p>Your contributions are always welcome!</p>
|
||
<p><a
|
||
href="https://github.com/HenryHoggard/awesome-arm-exploitation">armexploitation.md
|
||
Github</a></p>
|