shakevsky / keybusterLinks
☆132Updated 3 years ago
Alternatives and similar repositories for keybuster
Users that are interested in keybuster are comparing it to the libraries listed below
Sorting:
- Exploit code for CVE-2021-1961☆118Updated 3 years ago
- Widevine L3 PoC for Android Keybox Recovery, Content Key dump and Netflix Media Download☆98Updated 4 years ago
- Full TrustZone exploit for MSM8974☆141Updated 9 years ago
- A rewrite of laginimaineb MSM8974_exploit as a stand alone kernel module.☆18Updated 9 years ago
- Android kernel exploitation for CVE-2022-20409☆197Updated last year
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆93Updated 7 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Updated 6 years ago
- ☆30Updated 3 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- A tool to trace Widevine execution in Android and dump buffers.☆110Updated 3 years ago
- Widevine Key Ladder in Python3☆45Updated 3 years ago
- Some RE work on Apple's Fairplay DRM☆224Updated 2 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- ☆77Updated 3 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆174Updated 2 years ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆77Updated 11 months ago
- Qualcomm TrustZone kernel privilege escalation☆67Updated 9 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆169Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆77Updated last year
- This repository contains the tools we used in our research on the Google Titan M chip☆205Updated 3 years ago
- Hexagon decompiler for Ghidra☆52Updated 3 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆122Updated 4 years ago
- trustonic tbase research☆32Updated 7 years ago