Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431
☆362Jun 30, 2016Updated 9 years ago
Alternatives and similar repositories for ExtractKeyMaster
Users that are interested in ExtractKeyMaster are comparing it to the libraries listed below
Sorting:
- Scripts to bruteforce Android's Full Disk Encryption off the device☆186Jul 2, 2016Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Aug 13, 2019Updated 6 years ago
- Full TrustZone exploit for MSM8974☆142Jan 24, 2016Updated 10 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- A simple overview of known Widevine devices with System IDs☆64Jul 17, 2022Updated 3 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Jan 24, 2016Updated 10 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Feb 17, 2016Updated 10 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Modified shaka-packager☆20Jun 9, 2022Updated 3 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Nov 11, 2019Updated 6 years ago
- Python library for interacting with the E2E encrypted Hulu API☆35Dec 27, 2019Updated 6 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Dec 9, 2022Updated 3 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Tools for Widevine and Playready☆60Feb 14, 2026Updated 2 weeks ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆312Apr 7, 2023Updated 2 years ago
- A tool for analyzing Netflix MSL API☆77Apr 15, 2022Updated 3 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆99Dec 13, 2021Updated 4 years ago
- ☆135Aug 4, 2022Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆53Jan 9, 2022Updated 4 years ago
- Python Based Widevine Modular PSSH Decoder☆58May 16, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Android bootloader (aboot) parser☆64Apr 9, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- some vul☆789Apr 25, 2025Updated 10 months ago
- PEI stage backdoor for UEFI compatible firmware☆228May 1, 2021Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow☆271Jan 27, 2017Updated 9 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆993Feb 3, 2021Updated 5 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆116Feb 2, 2022Updated 4 years ago