chesseed / CuberLinks
A signing tool for exploitable bootloaders
☆25Updated 11 years ago
Alternatives and similar repositories for Cuber
Users that are interested in Cuber are comparing it to the libraries listed below
Sorting:
- Android bootloader (aboot) parser☆64Updated last year
- IDA PRO plugins, scripts and loaders for mbn and sbl bootloader formats☆22Updated 9 years ago
- Unpacks the Motorola motoboot.img binary☆20Updated 9 years ago
- A tool to dump RAM using S-Boot Upload Mode☆41Updated 8 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Updated 10 years ago
- Reverse engineer protobuf from javanano☆29Updated 8 years ago
- Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass☆80Updated 8 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Updated 9 years ago
- Bootloader unlocking code for Motorola devices☆102Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Samsung Galaxy S3 GT-I9300 eMMC toolbox☆104Updated 7 years ago
- ☆30Updated 8 years ago
- Unofficial port of setools to Android☆27Updated 8 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) - recowvery fork☆150Updated 8 years ago
- A signing tool for exploitable bootloaders☆20Updated 10 years ago
- Utility to extract kernel and ramdisk from an Android boot or recovery image file☆58Updated 8 years ago
- ☆25Updated 6 years ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆276Updated 4 years ago
- Change the CID in Samsung eMMC☆189Updated 2 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆94Updated 7 years ago
- [Xposed module] Disable device compatibility check☆85Updated 9 years ago
- Loki: tools for custom kernels and recoveries on AT&T and Verizon Samsung Galaxy S4 and various LG devices☆199Updated 9 years ago
- ☆32Updated 9 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆20Updated 12 years ago
- A bootrom exploit for MediaTek devices☆198Updated 6 years ago
- Tool for communicating with Sahara protocol (DBL) on iPhone4 CDMA, iPhone4s, and iPhone5 (Apple SAH Protocol)☆21Updated 12 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Updated 6 years ago
- temporary root for the Galaxy S7 Active☆21Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 3 years ago