Using the Shofel2 exploit to unbrick the Nvidia Shield tablet.
Go to file
2024-05-25 18:45:07 +02:00
__pycache__ fully working method 2024-05-25 18:45:07 +02:00
.vscode fully working method 2024-05-25 18:45:07 +02:00
bin fully working method 2024-05-25 18:45:07 +02:00
blog fully working method 2024-05-25 18:45:07 +02:00
ShofEL2-for-T124 Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
venv fully working method 2024-05-25 18:45:07 +02:00
bootloader.bin fully working method 2024-05-25 18:45:07 +02:00
bootrom_t124.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
dumped_ref0.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
dumped.bin Imlemented basic command handler and added memdump functionality 2021-11-22 23:22:01 +01:00
exploit.py fully working method 2024-05-25 18:45:07 +02:00
GA_debugger.py fully working method 2024-05-25 18:45:07 +02:00
imem3_bct fully working method 2024-05-25 18:45:07 +02:00
imem_good.bin fully working method 2024-05-25 18:45:07 +02:00
imem_ref0_t124.bin Added code that will do memdumping based on architecture, but code is not functioning well on the nvidia shield 2022-08-10 12:20:47 +02:00
notes.md fully working method 2024-05-25 18:45:07 +02:00
patches.py fully working method 2024-05-25 18:45:07 +02:00
t210.py fully working method 2024-05-25 18:45:07 +02:00
tools.py fully working method 2024-05-25 18:45:07 +02:00