radcolor / arm-linux-gnueabiLinks
⚒️ Bleeding edge GNU GCC toolchains (CC only) built from sources with latest binutils and glibc. (for ARM)
☆13Updated 3 years ago
Alternatives and similar repositories for arm-linux-gnueabi
Users that are interested in arm-linux-gnueabi are comparing it to the libraries listed below
Sorting:
- L8 R8:Cortex-A53 LTE SoC☆27Updated 6 years ago
- ☆31Updated 2 months ago
- ☆23Updated 8 years ago
- use for unlock research☆25Updated 2 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- MediaTek BP firmware tools☆66Updated last month
- Bootkits☆18Updated 2 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 4 years ago
- ☆35Updated 4 years ago
- ☆95Updated 4 years ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆78Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- Full chain Chrome 71.0.3578.98 exploit☆21Updated 4 years ago
- ☆59Updated 5 years ago
- Research related☆89Updated 3 years ago
- Enabling KGDB over USB for Android☆52Updated 15 years ago
- IDA script for parsing kallsyms☆86Updated 3 weeks ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- github pages repository☆14Updated last month
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆56Updated 5 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- ☆51Updated last year
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Updated 5 years ago
- ☆14Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago