shakevsky / keybusterLinks
☆126Updated 2 years ago
Alternatives and similar repositories for keybuster
Users that are interested in keybuster are comparing it to the libraries listed below
Sorting:
- Exploit code for CVE-2021-1961☆112Updated 2 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆94Updated 3 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆103Updated 3 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆38Updated 5 years ago
- Android kernel exploitation for CVE-2022-20409☆189Updated 8 months ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Updated 9 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- Widevine Key Ladder in Python3☆42Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆65Updated 2 years ago
- Full TrustZone exploit for MSM8974☆140Updated 9 years ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆73Updated 5 months ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆165Updated last year
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆121Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆91Updated 6 years ago
- ☆28Updated 2 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆157Updated 11 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆254Updated 2 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆124Updated 3 years ago
- ☆44Updated 8 months ago
- ☆73Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆96Updated last year
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆68Updated 9 months ago
- Hexagon decompiler for Ghidra☆48Updated 3 years ago
- Some RE work on Apple's Fairplay DRM☆210Updated 2 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆229Updated 5 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆189Updated 2 years ago
- ☆119Updated 2 years ago
- trustonic tbase research☆31Updated 7 years ago