ghassani / qc-tz-es-activated-exploit
A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.
☆18Updated 9 years ago
Alternatives and similar repositories for qc-tz-es-activated-exploit:
Users that are interested in qc-tz-es-activated-exploit are comparing it to the libraries listed below
- Full TrustZone exploit for MSM8974☆139Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆117Updated 5 years ago
- ☆122Updated 2 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- Some stuff for doing insane qc chipset pwning.☆40Updated 2 years ago
- Exploit code for CVE-2021-1961☆110Updated 2 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆93Updated 3 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆26Updated 4 years ago
- Qualcomm TrustZone kernel privilege escalation☆62Updated 8 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆60Updated 9 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆87Updated 6 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆97Updated 3 years ago
- A proxy library between Chromium browser and WidevineCDM library.☆29Updated 4 years ago
- Widevine Key Ladder in Python3☆39Updated 3 years ago
- ☆9Updated 4 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Updated 11 years ago
- SafetyNet Jar download & extractor utility☆36Updated 7 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆36Updated 4 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- Running sboot with unicorn engine☆35Updated 5 years ago
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- BootROM dumps from misc SoCs☆37Updated 5 months ago
- Hexagon decompiler for Ghidra☆46Updated 3 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 9 years ago
- ☆69Updated 3 years ago
- reversing mtk-su☆17Updated 4 years ago
- Python library for interacting with the E2E encrypted Hulu API☆35Updated 5 years ago