j4nn / CVE-2020-0041
☆53Updated 5 months ago
Alternatives and similar repositories for CVE-2020-0041
Users that are interested in CVE-2020-0041 are comparing it to the libraries listed below
Sorting:
- MTK Preloader Parser☆39Updated 3 years ago
- ☆93Updated 3 years ago
- Dump Android Verified Boot Signature☆60Updated 5 years ago
- Qualcomm image unpacker☆83Updated last year
- ☆79Updated last year
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆116Updated 6 years ago
- Unsigned code loader for Exynos BootROM☆105Updated 4 years ago
- Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system☆13Updated 2 years ago
- Utilitiy for working with Android firmware .img files☆33Updated 5 years ago
- Read and write Huawei's nvme image with ADB☆43Updated last year
- ☆86Updated 4 years ago
- ☆27Updated 3 years ago
- Loadable Kernel Module for Android☆72Updated 5 years ago
- android root tools by myself.☆29Updated 5 years ago
- QC EDL Emulator based on Qiling☆22Updated 4 years ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆117Updated 5 years ago
- Exploit for LG Q710ULM (Stylo 4 AMZ variant) for writing arbitrary contents to eMMC and patching aboot via S-EL3 warmboot takeover☆13Updated 4 years ago
- ☆18Updated 3 years ago
- EDL exploit for Redmi 3S☆36Updated 3 years ago
- ☆21Updated 4 years ago
- ☆75Updated 5 years ago
- Python tool to check your Android kernel for missing CVE patches.☆47Updated 5 years ago
- Unpack UPDATE.APP files☆51Updated 3 years ago
- ☆19Updated last year
- Android kernel exploitation for CVE-2022-20409☆180Updated 6 months ago
- Let's control Secure Boot Chain ourselves.☆60Updated 2 months ago
- Extractor: The Android firmware image extraction tool☆96Updated 10 months ago
- ☆30Updated 2 years ago
- Tool to expose and interact with the AT modem om Samsung Galaxy devices☆41Updated 2 years ago
- Run arbitrary code by patching OAT files☆87Updated last year