EliseZeroTwo / ml1haxLinks
An exploit chain for the Magic Leap One (and probably other TX2 devices)
☆67Updated 4 months ago
Alternatives and similar repositories for ml1hax
Users that are interested in ml1hax are comparing it to the libraries listed below
Sorting:
- ☆93Updated 2 months ago
- ☆14Updated 2 years ago
- Some tools and exploits for the NVIDIA Falcon v5 TSEC engines☆30Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Determine which CPU architecture is used in a binary file.☆122Updated 7 months ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆38Updated 2 years ago
- Support of Nvidia Falcon processors for Ghidra☆73Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Wii U DNS exploit☆157Updated last year
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- Tegra2/X1/X1+ emulation☆36Updated 6 months ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆36Updated 2 years ago
- Attempt to natively run JVM bytecode on the Wii's Starlet☆70Updated 10 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated last week
- ☆129Updated 2 years ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆30Updated 7 months ago
- Kexec as loadable kernel module for Linux ARM64 kernels☆33Updated 2 years ago
- Convert low ghidra pcode to verifiable C☆22Updated last year
- XBOX 360 advanced glitching - Reverse Engineered using a logic analyzer.☆124Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- arm decoders for the yaxpeax project☆31Updated 4 months ago
- Overview of Secure-Launch process on Qualcomm devices☆64Updated last year
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆24Updated last year
- yaxdis, a small and naive disassembler using yaxpeax decoders☆34Updated 5 months ago
- An implementation of the RL78 ISA for Ghidra SRE☆27Updated 4 years ago
- F-Droid Fake Signer PoC☆126Updated 8 months ago
- iTLB multihit PoC☆42Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆53Updated 10 months ago