fabianishere / kexec-modLinks
Kexec as loadable kernel module for Linux ARM64 kernels
☆27Updated 2 years ago
Alternatives and similar repositories for kexec-mod
Users that are interested in kexec-mod are comparing it to the libraries listed below
Sorting:
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- A list of mainboards with their status of BootGuard. See https://felixsinger.github.io/bootguard-status☆28Updated 6 months ago
- USB-Cereal is a debugging and development tool for designs that use USB-C port and bring out serial TX/RX lines into SBU1/2 pins. USB-Cer…☆83Updated 3 years ago
- Unsigned code loader for Amlogic BootROM☆81Updated 2 years ago
- Tegra 3 and Tegra 4 TrustZone UEFI variable services handler exploit and Secure Boot unlock tool☆94Updated 4 years ago
- Light scaffolding for building kexec as a loadable kernel module☆15Updated 7 years ago
- Vulnerability in the Samsung Galaxy S5 Bootloader☆14Updated 2 years ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆52Updated 7 months ago
- ☆21Updated 6 years ago
- Overview of Secure-Launch process on Qualcomm devices☆62Updated last year
- Notes and utilities for reverse engineering the firmware used in MediaTek's WiFi cores. This includes the cores used in PCIe/USB/SDIO-att…☆21Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- python to tax form compiler☆12Updated 3 years ago
- Linux kernel module to use UEFI Block IO Protocol devices. Probably not a good idea.☆80Updated 3 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- ☆88Updated 3 months ago
- Notes and utilities for reverse engineering ASMedia xHC (USB 3.x) Host Controllers.☆28Updated last week
- BootROM dumps from misc SoCs☆40Updated 4 months ago
- Secure-Launch implementation for Qualcomm devices☆86Updated last month
- This is a simple how-to to create your own android kernel debugging cable using commercially available parts.☆205Updated 3 years ago
- Tools for manipulating Qualcomm XBL images☆19Updated last year
- A simple x86 EFI bootloader for Android™ boot images☆28Updated 6 years ago
- Extract chunks from Insyde H2O Iflash files☆19Updated 5 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆57Updated 2 months ago
- Reverse engineering the Motorola sensorhub firmware☆19Updated 2 years ago
- Dump WMI informations from ACPI tables☆37Updated 3 years ago
- MediaTek CCPU (GCPU) processor module for Ghidra.☆13Updated last year
- ☆11Updated 4 months ago
- Reverse-engineering the Apple Video Decoder (AVD)☆145Updated last year
- iPhone 15 compatible firmware for the central scrutinizer.☆46Updated last year