EliseZeroTwo / ml1haxLinks
An exploit chain for the Magic Leap One (and probably other TX2 devices)
☆57Updated 2 months ago
Alternatives and similar repositories for ml1hax
Users that are interested in ml1hax are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- ☆88Updated 3 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated this week
- Determine which CPU architecture is used in a binary file.☆121Updated 4 months ago
- playing with DDR DRAM bus fault injection☆92Updated 9 months ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆68Updated last year
- Convert low ghidra pcode to verifiable C☆22Updated 10 months ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆62Updated last year
- Attempt to natively run JVM bytecode on the Wii's Starlet☆68Updated 7 months ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆52Updated 7 months ago
- Some tools and exploits for the NVIDIA Falcon v5 TSEC engines☆30Updated 3 years ago
- Support of Nvidia Falcon processors for Ghidra☆70Updated 10 months ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆35Updated last year
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆24Updated 9 months ago
- ☆128Updated 2 years ago
- My Analysis of the VC4 Assembly Code from the RPI4☆35Updated 5 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆119Updated this week
- F-Droid Fake Signer PoC☆126Updated 5 months ago
- Dalvik bytecode disassembler and graph view☆67Updated last year
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 3 months ago
- ☆30Updated last week
- ☆95Updated last year
- Ghidra Data Type (GDT) Helper☆49Updated 3 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆14Updated 2 years ago
- Reverse engineering the Motorola sensorhub firmware☆19Updated 2 years ago