fabianishere / kexec-modLinks
Kexec as loadable kernel module for Linux ARM64 kernels
☆32Updated 2 years ago
Alternatives and similar repositories for kexec-mod
Users that are interested in kexec-mod are comparing it to the libraries listed below
Sorting:
- USB-Cereal is a debugging and development tool for designs that use USB-C port and bring out serial TX/RX lines into SBU1/2 pins. USB-Cer…☆87Updated 4 years ago
- Unsigned code loader for Amlogic BootROM☆81Updated 2 years ago
- Light scaffolding for building kexec as a loadable kernel module☆16Updated 7 years ago
- Overview of Secure-Launch process on Qualcomm devices☆63Updated last year
- A simple x86 EFI bootloader for Android™ boot images☆28Updated 6 years ago
- ☆15Updated 2 months ago
- Tools for manipulating Qualcomm XBL images☆19Updated last year
- work-in-progress launcher for one of the Tegra X1 bootROM exploits with branches to support T132, T30, and (WIP) T20☆27Updated 6 years ago
- ☆40Updated last year
- This is a simple how-to to create your own android kernel debugging cable using commercially available parts.☆209Updated 4 years ago
- A list of mainboards with their status of BootGuard. See https://felixsinger.github.io/bootguard-status☆28Updated 7 months ago
- ☆31Updated 2 years ago
- Tegra 3 and Tegra 4 TrustZone UEFI variable services handler exploit and Secure Boot unlock tool☆94Updated 4 years ago
- Secure-Launch implementation for Qualcomm devices☆90Updated last month
- Extract chunks from Insyde H2O Iflash files☆23Updated 5 years ago
- ☆92Updated 3 weeks ago
- legacy MTK devices preLoader from Mediatek☆14Updated last year
- legacy MTK devices little-kernel from Mediatek (Android 10/11)☆24Updated last year
- Official QEMU mirror☆30Updated last week
- Kernel and lk source for mt65x2☆43Updated 9 years ago
- ☆21Updated 6 years ago
- Simple tool to "sign" ELF Qualcomm firmware images using dummy certificates ("test keys")☆53Updated 2 weeks ago
- BootROM dumps from misc SoCs☆40Updated 5 months ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆71Updated last year
- XNU in Linux userspace☆182Updated 3 years ago
- Reverse-engineering the Apple Video Decoder (AVD)☆147Updated last year
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆64Updated 3 months ago
- ☆10Updated last year
- Linux kernel module to use UEFI Block IO Protocol devices. Probably not a good idea.☆82Updated 3 years ago
- LK directly running in EDL mode, Qualcomm Secure Boot exploit on Redmi 3S.(https://github.com/fxsheep/firehorse_land)☆25Updated 3 years ago