laginimaineb / cve-2016-2431Links
Qualcomm TrustZone kernel privilege escalation
☆66Updated 9 years ago
Alternatives and similar repositories for cve-2016-2431
Users that are interested in cve-2016-2431 are comparing it to the libraries listed below
Sorting:
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 5 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆122Updated 6 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 2 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Full TrustZone exploit for MSM8974☆141Updated 9 years ago
- Some tee/trustzone helper stuff☆54Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆37Updated 10 years ago
- Google Project Zero OS X Vul Report Analysis☆33Updated 8 years ago
- Huawei mate 7 TrustZone exploit☆110Updated 10 years ago
- ☆51Updated last year
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 7 years ago
- IDA Python Scripts☆46Updated 16 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- reversing mtk-su☆17Updated 5 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Updated 11 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- ☆41Updated 8 years ago
- All You Need For Ida Pro And Android Debugging☆63Updated 10 years ago
- ☆60Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆114Updated 8 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆23Updated 6 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes☆53Updated 8 years ago