anestisb / qc_image_unpackerLinks
Qualcomm image unpacker
☆84Updated 2 years ago
Alternatives and similar repositories for qc_image_unpacker
Users that are interested in qc_image_unpacker are comparing it to the libraries listed below
Sorting:
- Unsigned code loader for Exynos BootROM☆113Updated 5 years ago
- Dump Android Verified Boot Signature☆64Updated 6 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆93Updated 7 years ago
- QC EDL Emulator based on Qiling☆24Updated 4 years ago
- Python tool to check your Android kernel for missing CVE patches.☆48Updated 6 years ago
- This is a simple how-to to create your own android kernel debugging cable using commercially available parts.☆215Updated 4 years ago
- Some tools for reversing QDSP hexagon☆40Updated 4 years ago
- CLI tool for reading and display information about files in Qualcomm mbn format☆58Updated 7 years ago
- ☆48Updated 7 years ago
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆117Updated 7 years ago
- A tool to dump RAM using S-Boot Upload Mode☆40Updated 8 years ago
- ☆82Updated last year
- ☆57Updated 11 months ago
- Emulating Exynos 4210 BootROM in QEMU☆76Updated 5 years ago
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆34Updated 2 years ago
- Extractor: The Android firmware image extraction tool☆110Updated last year
- An S-Boot fuzzer based on Heimdall☆26Updated 8 years ago
- A bootrom exploit for MediaTek devices☆192Updated 6 years ago
- Утилита для обработки образов NVRAM устройств на чипсете Hisilicon Balong.☆53Updated 5 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆170Updated 2 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆39Updated 11 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆23Updated 6 years ago
- Some stuff for doing insane qc chipset pwning.☆44Updated 3 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆46Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆166Updated last year
- MTK Preloader Parser☆44Updated 3 years ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆272Updated 3 years ago
- reversing mtk-su☆16Updated 5 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago