laginimaineb / standalone_msm8974View external linksLinks
Standalone C version of the MSM8974 TrustZone exploit
☆27Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for standalone_msm8974
Users that are interested in standalone_msm8974 are comparing it to the libraries listed below
Sorting:
- Full TrustZone exploit for MSM8974☆143Jan 24, 2016Updated 10 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Jan 24, 2016Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- RISCV-V disassembler for IDA Pro☆25Mar 26, 2017Updated 8 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- CVE-2014-4321 exploit☆21Mar 8, 2015Updated 10 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Dec 9, 2022Updated 3 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 11 years ago
- Inject userland ARM code through PSM☆12Apr 16, 2014Updated 11 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Emulating Exynos 4210 BootROM in QEMU☆77Feb 7, 2020Updated 6 years ago
- Ghidra processor module for some JieLi's custom CPU architectures☆17Feb 6, 2024Updated 2 years ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆21Sep 30, 2024Updated last year
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Sep 4, 2018Updated 7 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Feb 17, 2016Updated 9 years ago
- a c++11 wrapper for the jni library☆14Aug 14, 2016Updated 9 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- Fork of https://github.com/androguard/androguard w/ bug fixes tests☆14Jan 13, 2022Updated 4 years ago
- Bootloader unlocking code for Motorola devices☆102Feb 10, 2016Updated 10 years ago
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆362Jun 30, 2016Updated 9 years ago