laginimaineb / cve-2016-2431View external linksLinks
Qualcomm TrustZone kernel privilege escalation
☆67Jun 15, 2016Updated 9 years ago
Alternatives and similar repositories for cve-2016-2431
Users that are interested in cve-2016-2431 are comparing it to the libraries listed below
Sorting:
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- Full TrustZone exploit for MSM8974☆143Jan 24, 2016Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Jan 23, 2014Updated 12 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Jan 24, 2016Updated 10 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆362Jun 30, 2016Updated 9 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- This is a simple driver with x64 inline assembly☆57Jun 26, 2020Updated 5 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- ☆79May 13, 2016Updated 9 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- An IDA loader for analyzing Qualcomm bootloader files☆22Aug 20, 2017Updated 8 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆311Apr 7, 2023Updated 2 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- hahh☆22Feb 25, 2019Updated 6 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- ☆27May 5, 2016Updated 9 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago