laginimaineb / AlohamoraView external linksLinks
Bootloader unlocking code for Motorola devices
☆102Feb 10, 2016Updated 10 years ago
Alternatives and similar repositories for Alohamora
Users that are interested in Alohamora are comparing it to the libraries listed below
Sorting:
- Unpacks the Motorola motoboot.img binary☆20Feb 9, 2016Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- Script that generate the id of Motorola Phones for get the unlock bootloader☆25Feb 13, 2024Updated 2 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Full TrustZone exploit for MSM8974☆143Jan 24, 2016Updated 10 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Dec 9, 2022Updated 3 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Jan 23, 2014Updated 12 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Kernel-level emulation of rdtsc for Mac OS X☆15Mar 15, 2015Updated 10 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Scripts to bruteforce Android's Full Disk Encryption off the device☆186Jul 2, 2016Updated 9 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- Android Fastboot Utility Tool-Can do everything xD☆122May 22, 2022Updated 3 years ago
- A simple app that provides virtual environment. Unlock the bootloader or modify the system image, etc.☆14Feb 23, 2021Updated 4 years ago
- Moto E4 (Qualcomm) Device Tree☆12Oct 8, 2017Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- OpenPST - Phone servicing tool for Qualcomm SoC devices☆19Jan 8, 2017Updated 9 years ago
- Inofficial MTK reverse engineering and flash tool☆32Oct 27, 2025Updated 3 months ago
- These Android tools provide advanced features for modifying your device, including installing APKs, sideloading ZIPs, backing up data, re…☆25Apr 3, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆10Jun 13, 2014Updated 11 years ago
- Super simple standalone http proxy for i2p using SAM. (Also part of https://github.com/eyedeekay/sam-forwarder)☆10Jul 31, 2022Updated 3 years ago
- Windows Mobile Emulator source code that MS released. Modified to work with VS2022.☆16Mar 11, 2023Updated 2 years ago
- I2P jump service. A sort of slave DNS server for I2P.☆13Feb 24, 2022Updated 3 years ago
- ☆12Oct 17, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- Python script to split Android boot.img files.☆12Nov 11, 2012Updated 13 years ago
- A fully scriptable UEFI bootloader.☆13Aug 30, 2024Updated last year
- Magisk module that removes the bootloader unlock warning☆15Mar 15, 2024Updated last year
- Spreadtrum/Unisoc tools and utilities https://unisoc-android.github.io☆26Feb 7, 2022Updated 4 years ago