linux-msm / openocdLinks
OpenOCD with Qualcomm patches (rebased)
☆24Updated 9 months ago
Alternatives and similar repositories for openocd
Users that are interested in openocd are comparing it to the libraries listed below
Sorting:
- ☆97Updated 3 months ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆76Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆66Updated 2 years ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆59Updated last year
- A bootrom exploit for MediaTek devices☆198Updated 6 years ago
- This is a simple how-to to create your own android kernel debugging cable using commercially available parts.☆216Updated 4 years ago
- Another bootrom exploit for MediaTek devices☆225Updated 2 years ago
- Unsigned code loader for Amlogic BootROM☆91Updated 3 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆179Updated 2 years ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆82Updated last year
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆38Updated 3 years ago
- Kexec as loadable kernel module for Linux ARM64 kernels☆37Updated 2 years ago
- BootROM dumps from misc SoCs☆49Updated last week
- MediaTek BP firmware tools☆67Updated 3 weeks ago
- ☆51Updated 2 years ago
- Apple Silicon to Apple Silicon VDM utility☆54Updated 2 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Updated 3 years ago
- USB-Cereal is a debugging and development tool for designs that use USB-C port and bring out serial TX/RX lines into SBU1/2 pins. USB-Cer…☆94Updated 4 years ago
- Fuzzer for fastboot commands☆23Updated 2 years ago
- Unsigned code loader for Exynos BootROM☆118Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆76Updated 8 months ago
- playing with DDR DRAM bus fault injection☆93Updated last year
- ☆22Updated 6 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆115Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆125Updated 11 months ago
- Official QEMU mirror☆30Updated 5 months ago
- ☆81Updated last year
- USB DFU Client for Reverse Engineers☆28Updated 2 weeks ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago