seemoo-lab / bcm-publicLinks
DEPRECATED: Monitor Mode and Firmware patching framework for the Google Nexus 5, development moved to: https://github.com/seemoo-lab/nexmon
☆76Updated 2 years ago
Alternatives and similar repositories for bcm-public
Users that are interested in bcm-public are comparing it to the libraries listed below
Sorting:
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 7 years ago
- random bits and pieces from random sources☆34Updated 9 months ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆165Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- Hackable Bluetooth stack in Python☆102Updated 5 years ago
- The GSM parser used for GSMmap and SnoopSnitch (SRLabs)☆34Updated 10 years ago
- The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the securit…☆16Updated 10 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Updated 7 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Android bootloader (aboot) parser☆62Updated last year
- Cellular network research papers☆44Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 6 years ago
- Convert log messages by phones with XGold baseband processor back to GSM/UMTS radio messages☆158Updated 11 years ago
- Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass☆77Updated 7 years ago
- lte security☆41Updated 9 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- Security advisories☆168Updated 9 years ago
- ☆120Updated 8 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 9 years ago
- DIAG parser and to GSMTAP converter☆65Updated 7 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- ☆138Updated 7 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- Get essential address to get root, unlock security, and so on. This is based on android_run_root_shell code.☆80Updated 9 years ago
- Hardened PoC: PaX for Android☆38Updated 4 years ago
- Tools for analyzing hexagon code☆38Updated 9 years ago