frederic / qemu-exynos-bootromLinks
Emulating Exynos 4210 BootROM in QEMU
☆76Updated 5 years ago
Alternatives and similar repositories for qemu-exynos-bootrom
Users that are interested in qemu-exynos-bootrom are comparing it to the libraries listed below
Sorting:
- Some tools for reversing QDSP hexagon☆40Updated 4 years ago
- ☆61Updated 8 years ago
- ☆51Updated 2 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- QEMU with support for QDSP6 user mode emulation☆33Updated 6 years ago
- Official QEMU mirror☆30Updated 3 months ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- IDA processor module for the hexagon (QDSP6) processor☆235Updated 7 months ago
- Hexagon decompiler for Ghidra☆51Updated 3 years ago
- Qualcomm TrustZone kernel privilege escalation☆66Updated 9 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆93Updated 7 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆47Updated 5 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆23Updated 6 years ago
- ☆58Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆114Updated 8 years ago
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Updated 3 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Samsung Kernel Source from OSRC☆45Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆24Updated this week
- Collection of random files and tools I wrote to assist in reverse engineering and hacking the Withings WS-30 bathroom scale.☆71Updated 10 years ago
- A proof-of-concept for CVE-2020-12753☆43Updated 5 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆70Updated 9 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Updated last month
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- A PCode Emulator for Ghidra.☆110Updated 4 years ago