j4nn / CVE-2020-0041
☆49Updated 2 years ago
Related projects: ⓘ
- ☆17Updated 3 years ago
- Unsigned code loader for Exynos BootROM☆86Updated 4 years ago
- MTK Preloader Parser☆35Updated 2 years ago
- Qualcomm image unpacker☆78Updated last year
- Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system☆12Updated last year
- Let's control Secure Boot Chain ourselves.☆33Updated 6 months ago
- Exploit for LG Q710ULM (Stylo 4 AMZ variant) for writing arbitrary contents to eMMC and patching aboot via S-EL3 warmboot takeover☆10Updated 3 years ago
- QC EDL Emulator based on Qiling☆21Updated 3 years ago
- Unpack and repack Huawei oeminfo☆20Updated 5 years ago
- Unpack UPDATE.APP files☆49Updated 3 years ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆106Updated 4 years ago
- Dump Android Verified Boot Signature☆52Updated 5 years ago
- EDL exploit for Redmi 3S☆31Updated 3 years ago
- ☆87Updated 3 years ago
- Extractor: The Android firmware image extraction tool☆75Updated 2 months ago
- support linux & windows☆11Updated 5 years ago
- ☆68Updated 5 months ago
- ☆34Updated last year
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆105Updated 6 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆84Updated 6 years ago
- Spreadtrum / Unisoc Bootloader Unlock Tool☆21Updated 3 years ago
- Magisk Module with strace☆24Updated 3 years ago
- Android kernel exploitation for CVE-2022-20409☆156Updated last year
- ☆19Updated 5 years ago
- ☆73Updated 4 years ago
- ☆19Updated 3 years ago
- Tool to commuincate with Spreadtrum/Unisoc download mode☆15Updated 3 years ago
- ☆68Updated this week