QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
☆125Aug 13, 2019Updated 6 years ago
Alternatives and similar repositories for cve-2015-6639
Users that are interested in cve-2015-6639 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Standalone C version of the MSM8974 TrustZone exploit☆28Sep 30, 2020Updated 5 years ago
- Full TrustZone exploit for MSM8974☆144Jan 24, 2016Updated 10 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆62Jan 24, 2016Updated 10 years ago
- ☆27May 5, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆363Jun 30, 2016Updated 9 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆78Jan 24, 2016Updated 10 years ago
- Python library for interacting with the E2E encrypted Hulu API☆36Dec 27, 2019Updated 6 years ago
- ☆79May 13, 2016Updated 9 years ago
- cve-2014-4323 poc☆25Oct 15, 2015Updated 10 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- A Python MP4 Parser and toolkit☆18Mar 27, 2023Updated 3 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Sep 29, 2015Updated 10 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆89Apr 3, 2017Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆95Aug 6, 2018Updated 7 years ago
- ☆31Apr 20, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2015-1805 root tool☆279Nov 23, 2017Updated 8 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Calculate AES key from faulted output☆15Jul 27, 2023Updated 2 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆25Dec 9, 2022Updated 3 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆984Jan 7, 2026Updated 3 months ago
- A list of my CVE's with POCs☆683Dec 15, 2020Updated 5 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Python library for interacting with the Netflix MSL API☆83Jan 14, 2020Updated 6 years ago
- ☆19Mar 24, 2017Updated 9 years ago
- Exploit code for CVE-2016-1757☆84Apr 27, 2016Updated 9 years ago
- ☆10Oct 8, 2015Updated 10 years ago