laginimaineb / cve-2015-6639
QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
☆117Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for cve-2015-6639
- Full TrustZone exploit for MSM8974☆137Updated 8 years ago
- Qualcomm TrustZone kernel privilege escalation☆59Updated 8 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆59Updated 8 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆85Updated 6 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆74Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 8 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated last year
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆17Updated 8 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆50Updated 8 years ago
- CVE-2014-4322 Exploit☆22Updated 8 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆26Updated 4 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- ☆27Updated 8 years ago
- ☆114Updated 2 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆34Updated 4 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- A "shim" for loading native jni files for Android active debugging☆172Updated last year
- An IDA file loader for Mobicore trustlet and driver binaries☆58Updated 4 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- SafetyNet Jar download & extractor utility☆35Updated 7 years ago
- ☆71Updated 9 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆109Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆78Updated 5 years ago
- ☆25Updated 6 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 7 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆35Updated 9 years ago
- Android Vulnerability Reports and POCs.☆25Updated 7 years ago