Using the Shofel2 exploit to unbrick the Nvidia Shield tablet.
Go to file
2024-06-17 20:15:08 +02:00
__pycache__ started device implementation 2024-06-17 20:15:08 +02:00
.vscode started device implementation 2024-06-17 20:15:08 +02:00
bin fully working method 2024-05-25 18:45:07 +02:00
blog added hw device in the loop emulator 2024-05-30 10:15:36 +02:00
ShofEL2-for-T124 Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
venv started device implementation 2024-06-17 20:15:08 +02:00
bootloader.bin fully working method 2024-05-25 18:45:07 +02:00
bootrom_t124.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
dumped_ref0.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
dumped.bin Imlemented basic command handler and added memdump functionality 2021-11-22 23:22:01 +01:00
exploit.py fully working method 2024-05-25 18:45:07 +02:00
GA_debugger.py added hw device in the loop emulator 2024-05-30 10:15:36 +02:00
hw_in_the_loop.py added hw device in the loop emulator 2024-05-30 10:15:36 +02:00
imem3_bct fully working method 2024-05-25 18:45:07 +02:00
imem_good.bin fully working method 2024-05-25 18:45:07 +02:00
imem_ref0_t124.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
notes.md fully working method 2024-05-25 18:45:07 +02:00
partial_emulation.py started device implementation 2024-06-17 20:15:08 +02:00
patches.py fully working method 2024-05-25 18:45:07 +02:00
t210.py fully working method 2024-05-25 18:45:07 +02:00
tools.py fully working method 2024-05-25 18:45:07 +02:00