Samsung_S7/source/exploit
2024-08-12 16:58:46 +02:00
..
.vscode Minor docs update. Trying to dump memory 2024-08-09 22:16:13 +02:00
debugger updated docs 2024-08-12 16:57:40 +02:00
stage1 updated docs 2024-08-12 16:57:40 +02:00
.gitignore bl1 authenticated and jumped to 2024-08-09 22:22:16 +02:00
exploit.py fixed conflicts 2024-08-12 16:53:25 +02:00
exynos8890.dtsi
exynos8895-reference.dtsi
ghidra.py
modify_bin.py updated docs 2024-08-12 16:57:40 +02:00
Readme.md

Exploit

Python implementation of Frederick's exploit. This gives a bit more insight in the bug.

Debugger

The debugger is used for chain loading the next stages. See the documentation folder for more docs

Usage

Navigate to stage1 and build it:

export ANDROID_NDK_ROOT=$TOOLCHAINENV/android-ndk-r21_Linux
make

This will build stage1

python3 exploit.py