EliseZeroTwo / ml1haxLinks
An exploit chain for the Magic Leap One (and probably other TX2 devices)
☆64Updated 3 months ago
Alternatives and similar repositories for ml1hax
Users that are interested in ml1hax are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- ☆93Updated 3 weeks ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆30Updated 6 months ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Support of Nvidia Falcon processors for Ghidra☆72Updated 11 months ago
- Binja loader for AMD-SP or PSP firmware binaries.☆37Updated 2 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆36Updated 2 years ago
- Some tools and exploits for the NVIDIA Falcon v5 TSEC engines☆31Updated 3 years ago
- ☆128Updated 2 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated 3 weeks ago
- playing with DDR DRAM bus fault injection☆92Updated 10 months ago
- Write a Ghidra Extension without using Java or Eclipse!☆19Updated 7 months ago
- XBOX 360 advanced glitching - Reverse Engineered using a logic analyzer.☆124Updated last year
- Ghidra Data Type (GDT) Helper☆49Updated 3 years ago
- Kexec as loadable kernel module for Linux ARM64 kernels☆32Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Convert low ghidra pcode to verifiable C☆22Updated 11 months ago
- An implementation of the RL78 ISA for Ghidra SRE☆27Updated 4 years ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆71Updated last year
- Tegra2/X1/X1+ emulation☆35Updated 4 months ago
- ☆46Updated last year
- yaxdis, a small and naive disassembler using yaxpeax decoders☆34Updated 4 months ago
- arm decoders for the yaxpeax project☆31Updated 3 months ago
- BootROM dumps from misc SoCs☆40Updated 5 months ago
- Attempt to natively run JVM bytecode on the Wii's Starlet☆70Updated 9 months ago
- Wii U DNS exploit☆157Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆63Updated last year