mzakocs / qualcomm_baseband_scriptsLinks
Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware
☆169Updated 2 years ago
Alternatives and similar repositories for qualcomm_baseband_scripts
Users that are interested in qualcomm_baseband_scripts are comparing it to the libraries listed below
Sorting:
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆163Updated last year
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆74Updated 8 months ago
- MediaTek BP firmware tools☆61Updated last year
- Hexagon decompiler for Ghidra☆50Updated 3 years ago
- Samples of Shannon baseband firmware for research purposes.☆45Updated 3 years ago
- nanoMIPS module for Ghidra☆51Updated 9 months ago
- A curated list of awesome baseband research resources☆170Updated 5 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆41Updated 5 years ago
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆33Updated 2 years ago
- Some tools for reversing QDSP hexagon☆39Updated 4 years ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆73Updated last year
- QC EDL Emulator based on Qiling☆23Updated 4 years ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆195Updated 3 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆95Updated last year
- Notes and utilities for reverse engineering the MediaTek LTE baseband and its Coresonic DSP.☆204Updated 10 months ago
- Modification of LTE Firmwares on smartphones☆18Updated 4 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 2 months ago
- Android kernel exploitation for CVE-2022-20409☆194Updated 10 months ago
- ☆52Updated 2 years ago
- ☆60Updated 8 years ago
- ☆46Updated 10 months ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆230Updated 5 years ago
- USB device fuzzing on Android Phone☆32Updated 3 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆51Updated 6 months ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 7 years ago
- A firmware base address search tool.☆43Updated last year