ghassani / qc-tz-es-activated-exploit
A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.
☆18Updated 9 years ago
Alternatives and similar repositories for qc-tz-es-activated-exploit
Users that are interested in qc-tz-es-activated-exploit are comparing it to the libraries listed below
Sorting:
- Full TrustZone exploit for MSM8974☆139Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆120Updated 5 years ago
- ☆125Updated 2 years ago
- Exploit code for CVE-2021-1961☆111Updated 2 years ago
- Some stuff for doing insane qc chipset pwning.☆43Updated 2 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆94Updated 3 years ago
- A proxy library between Chromium browser and WidevineCDM library.☆30Updated 4 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- ☆9Updated 4 years ago
- Qualcomm TrustZone kernel privilege escalation☆63Updated 8 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆101Updated 3 years ago
- Widevine Key Ladder in Python3☆42Updated 3 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆89Updated 6 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆38Updated 4 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Updated 11 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 4 years ago
- SafetyNet Jar download & extractor utility☆37Updated 7 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- Hexagon decompiler for Ghidra☆47Updated 3 years ago
- QC EDL Emulator based on Qiling☆22Updated 4 years ago
- reversing mtk-su☆17Updated 5 years ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆10Updated 7 months ago
- A product that allows synchronizing symbols across multiple JEB/JADX instances; Allows teams to collaborate on Android decompilation proj…☆12Updated 9 months ago
- Hexagon processor module for IDA Pro disassembler☆18Updated 2 years ago
- A tool to dump RAM using S-Boot Upload Mode☆39Updated 8 years ago
- MTK Preloader Parser☆39Updated 3 years ago
- Some tools for reversing QDSP hexagon☆37Updated 4 years ago