Code to exploit and research the Exynos Bootrom
Go to file
2024-08-09 15:26:18 +02:00
.vscode Added .vscode 2024-01-02 13:29:15 +01:00
documentation changed exploit flow 2024-08-08 19:46:04 +02:00
dump updated exploit code 2024-07-15 11:30:03 +02:00
reven authbl1 with bl1 works 2024-08-09 12:57:34 +02:00
source Merge branch 'main' of https://git.herreweb.nl/EljakimHerrewijnen/Samsung_S7 into altered-script-flow 2024-08-09 15:26:18 +02:00
.gitignore Merge branch 'main' of https://git.herreweb.nl/EljakimHerrewijnen/Samsung_S7 2024-08-09 13:16:16 +02:00
README.md Update repository readme, requirements and add more flexible gitignore for frederics exynos-usbdl 2024-08-07 19:11:56 +02:00
requirements.txt Update repository readme, requirements and add more flexible gitignore for frederics exynos-usbdl 2024-08-07 19:11:56 +02:00

Samsung_S7

Code to exploit and research the Exynos Bootrom.

Setting up

Create a venv, and intall ghidra_assistant.

python3 -m venv venv
. venv/bin/activate
pip install -r requirements.txts

To get to work, run source/exploit/exploit.py

To view documentation, ensure you have sphinx installed. If not, run sudo apt install python3-sphinx. Then proceed to build the documentation by running make livehtml.