seemoo-lab / bcm-publicLinks
DEPRECATED: Monitor Mode and Firmware patching framework for the Google Nexus 5, development moved to: https://github.com/seemoo-lab/nexmon
☆76Updated 2 years ago
Alternatives and similar repositories for bcm-public
Users that are interested in bcm-public are comparing it to the libraries listed below
Sorting:
- The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the securit…☆16Updated 10 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 7 years ago
- Hackable Bluetooth stack in Python☆106Updated 5 years ago
- Bootloader unlocking code for Motorola devices☆97Updated 9 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Security advisories☆168Updated 9 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆167Updated 7 years ago
- ☆75Updated 9 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 9 years ago
- monitor mode wpa/wpa2 password bruteforcer☆17Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Android bootloader (aboot) parser☆63Updated last year
- Convert log messages by phones with XGold baseband processor back to GSM/UMTS radio messages☆160Updated 11 years ago
- Cellular network research papers☆45Updated 8 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆74Updated 7 years ago
- Scripts to bruteforce Android's Full Disk Encryption off the device☆183Updated 9 years ago
- the core of the cSploit project☆35Updated 7 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆94Updated 6 years ago
- The GSM parser used for GSMmap and SnoopSnitch (SRLabs)☆36Updated 10 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 2 years ago
- Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass☆78Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆274Updated 3 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- ☆195Updated 2 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- The firmware for QCA AR7010/AR9271 802.11n USB NICs☆33Updated 3 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago