laginimaineb / MSM8974_exploit
Full TrustZone exploit for MSM8974
☆139Updated 9 years ago
Alternatives and similar repositories for MSM8974_exploit:
Users that are interested in MSM8974_exploit are comparing it to the libraries listed below
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆119Updated 5 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- Qualcomm TrustZone kernel privilege escalation☆63Updated 8 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆88Updated 6 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆37Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆42Updated 7 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 4 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆113Updated 8 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆54Updated 8 years ago
- ☆54Updated 7 years ago
- A tool to dump RAM using S-Boot Upload Mode☆37Updated 8 years ago
- IDA processor module for the hexagon (QDSP6) processor☆229Updated this week
- ☆32Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Some stuff for doing insane qc chipset pwning.☆42Updated 2 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆148Updated 5 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆79Updated 5 years ago
- Adds symbols to a ELF file.☆61Updated 9 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆246Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Scripts to bruteforce Android's Full Disk Encryption off the device☆176Updated 8 years ago
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆344Updated 8 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- ☆123Updated 2 years ago