frederic / exynos8890-bootrom-dumpLinks
dump Exynos 8890 bootROM from Samsung Galaxy S7
☆39Updated 5 years ago
Alternatives and similar repositories for exynos8890-bootrom-dump
Users that are interested in exynos8890-bootrom-dump are comparing it to the libraries listed below
Sorting:
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Hexagon decompiler for Ghidra☆49Updated 3 years ago
- trustonic tbase research☆31Updated 7 years ago
- ☆58Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- ☆57Updated 7 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 2 years ago
- ☆34Updated 3 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- A firmware base address search tool.☆45Updated last year
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆42Updated 3 years ago
- ☆61Updated 6 months ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆114Updated last year
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 6 years ago
- Samples of Shannon baseband firmware for research purposes.☆43Updated 3 years ago
- baseband security research☆84Updated 4 years ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆74Updated 7 months ago
- ☆31Updated 4 years ago
- ☆51Updated last year
- Some tools for reversing QDSP hexagon☆39Updated 4 years ago
- ☆91Updated 2 years ago
- ☆41Updated 8 years ago
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- Qualcomm TrustZone kernel privilege escalation☆65Updated 9 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago