EliseZeroTwo / ml1haxLinks
An exploit chain for the Magic Leap One (and probably other TX2 devices)
☆71Updated 7 months ago
Alternatives and similar repositories for ml1hax
Users that are interested in ml1hax are comparing it to the libraries listed below
Sorting:
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆49Updated 3 years ago
- ☆14Updated 2 years ago
- Some tools and exploits for the NVIDIA Falcon v5 TSEC engines☆33Updated 3 years ago
- ☆97Updated 2 months ago
- Determine which CPU architecture is used in a binary file.☆125Updated 9 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Support of Nvidia Falcon processors for Ghidra☆73Updated last year
- Binja loader for AMD-SP or PSP firmware binaries.☆41Updated 2 years ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆32Updated 10 months ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆38Updated 2 years ago
- Wii U DNS exploit☆157Updated 2 years ago
- Tegra2/X1/X1+ emulation☆35Updated 8 months ago
- Kexec as loadable kernel module for Linux ARM64 kernels☆36Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆74Updated 2 years ago
- XBOX 360 advanced glitching - Reverse Engineered using a logic analyzer.☆124Updated last year
- playing with DDR DRAM bus fault injection☆93Updated last year
- Write a Ghidra Extension without using Java or Eclipse!☆17Updated 11 months ago
- ☆129Updated 3 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated last week
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆27Updated 11 months ago
- Overview of Secure-Launch process on Qualcomm devices☆66Updated last year
- Natively running JVM bytecode on the Wii's Starlet☆72Updated last year
- ☆20Updated last year
- Ghidra Data Type (GDT) Helper☆52Updated 4 years ago
- LM32 processor module for Ghidra. Useful for AMD SMU reverse engineering.☆14Updated 3 weeks ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆72Updated last year
- BootROM dumps from misc SoCs☆44Updated 2 months ago
- ☆31Updated last week
- Something with wine. I always wanted to try that out, but never had the time. Now I do.☆22Updated 2 years ago