laginimaineb / standalone_msm8974Links
Standalone C version of the MSM8974 TrustZone exploit
☆27Updated 4 years ago
Alternatives and similar repositories for standalone_msm8974
Users that are interested in standalone_msm8974 are comparing it to the libraries listed below
Sorting:
- Qualcomm TrustZone kernel privilege escalation☆65Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- CVE-2015-2231 POC☆10Updated 10 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 2 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Google Project Zero OS X Vul Report Analysis☆33Updated 8 years ago
- Exploit Android MSM8974 Chipset☆13Updated 10 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- dropbox of random test code...☆33Updated 9 years ago
- Patches to the Nexus 6 (Shamu) kernel source to allow KGDB over serial debug cable☆33Updated 6 years ago
- PoC code for CVE-2017-13253☆37Updated 4 years ago
- CVE-2015-1805 root tool☆13Updated 5 years ago
- ☆25Updated 7 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆122Updated 6 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- ☆13Updated 9 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆37Updated 9 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- temporary root for the Galaxy S7 Active☆21Updated 8 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago