Code to exploit and research the Exynos Bootrom
Go to file
2024-08-14 19:46:27 +02:00
.vscode Added .vscode 2024-01-02 13:29:15 +01:00
documentation Booting bl31 fails as soon as we jump into it at 02021810 2024-08-13 16:42:17 +02:00
dump updated exploit code 2024-07-15 11:30:03 +02:00
reven pushed ghidra db 2024-08-12 16:56:19 +02:00
source usb stack likely not executable 2024-08-14 19:46:27 +02:00
.gitignore Merge branch 'main' of https://git.herreweb.nl/EljakimHerrewijnen/Samsung_S7 2024-08-09 13:16:16 +02:00
README.md Update repository readme, requirements and add more flexible gitignore for frederics exynos-usbdl 2024-08-07 19:11:56 +02:00
requirements.txt Update repository readme, requirements and add more flexible gitignore for frederics exynos-usbdl 2024-08-07 19:11:56 +02:00

Samsung_S7

Code to exploit and research the Exynos Bootrom.

Setting up

Create a venv, and intall ghidra_assistant.

python3 -m venv venv
. venv/bin/activate
pip install -r requirements.txts

To get to work, run source/exploit/exploit.py

To view documentation, ensure you have sphinx installed. If not, run sudo apt install python3-sphinx. Then proceed to build the documentation by running make livehtml.