Jun 07, 2008 Archive ARTeam: ArmaGeddon v1.0 Conceptual overview tool for unpacking Armadillo by CondZero Advanced Reversing and Programming. Nov 02, 2019 However, a couple of weeks back, I think since I installed Windows XP SP3, the unpacked application refused to run, and Armageddon does not unpack it correctly anymore. Thanks for your interest. Should armadillo unpacker released fairly soon.
Releases/Tools [ Download ARTeam Releases. ]
![Armageddon V1 8 By Arteam Tutorial Armageddon V1 8 By Arteam Tutorial](/uploads/1/2/5/8/125837890/375807093.png)
ArmaG3ddon v2.2 | ||
Author | ARTeam | |
Description | Armag3ddon Armadillo unpacking tool designed specifically to deal with the many protection features available in versions 3.78 thru 9.6 and possibly above (see readme.txt for details) UPDATE: - New BeaEngine.dll replaces RDisasm.dll for disassembling instructions. - Win 7 support 32 bit applications. - Window Caption (EnumWindows) Hide Window Support provided automatically. - Armadillo Version support has been removed. | |
Watch Online | no image available | |
Filesize | 1.13 MB | |
Date | Monday 24 November 2014 - 22:49:00 | |
Downloads | 166097 | |
Download | ||
Rating |
| |
Report broken download |
<< Previous [PunchIt v12] | Back to list | [Fixed OllyDbg disasm DLL] Next >> |
![Arteam Arteam](/uploads/1/2/5/8/125837890/986243094.png)
This repository contains several libraries and tools to perform cache-attacks onthe mobile devices. The published code has been used to perform the mostpowerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, Flush+Flush on non-rooted ARM-based devices without any privileges.
We have developed this libraries and tools in the ARMageddon: Cache Attacks on Mobile Devices paper and used it to build covert-channels that outperform state-of-the-art covert channels on Android by several orders of magnitude. We utilized it to implement cache template attacks that monitor tap and swipe events as well as keystrokes, and even derive the words entered on the touchscreen. Moreover, we used it to attack cryptographic primitives in Java and to monitor cache activity in the ARM TrustZone from the normal world.
The ARMageddon: Cache Attacks on Mobile Devices paper by Lipp, Gruss, Spreitzer, Maurice and Mangard has be published at the Usenix Security Symposium 2016 and presented at Black Hat Europe 2016.
Repository Content
Project | Description |
---|---|
libflush | Library to build cross-platform cache attacks |
Cache Template Attacks | Cross-platform implementation of Cache Template Attacks |
Eviction Strategy Evaluator | Find eviction strategy for your device |
Input Simulator | Simple tool to simulate touch events |
References
- [1] ARMageddon: Cache Attacks on Mobile Devices - Lipp, Gruss, Spreitzer, Maurice, Mangard
- [2] ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy (Black Hat Europe 2016) - Lipp, Maurice