timwr / CVE-2013-6282Links
CVE-2013-6282 proof of concept for Android
☆20Updated 9 years ago
Alternatives and similar repositories for CVE-2013-6282
Users that are interested in CVE-2013-6282 are comparing it to the libraries listed below
Sorting:
- Dump Android Verified Boot Signature☆65Updated 6 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆23Updated 6 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 8 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Updated 9 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 6 years ago
- A proof-of-concept for CVE-2020-12753☆44Updated 5 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Updated 11 years ago
- reversing mtk-su☆16Updated 5 years ago
- dropbox of random test code...☆33Updated 10 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- ☆41Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Updated 9 years ago
- ☆76Updated 6 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Some tools for reversing QDSP hexagon☆40Updated 5 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆47Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆89Updated 9 years ago
- ☆52Updated 2 years ago
- Android bootloader (aboot) parser☆65Updated last year
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- temporary root for the Galaxy S7 Active☆21Updated 9 years ago
- Android Unpacking Automation using Corellium Devices☆136Updated last month
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆219Updated 11 years ago
- ☆23Updated 8 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago