2269
Comment: BitUnmap
|
2516
typo
|
Deletions are marked like this. | Additions are marked like this. |
Line 16: | Line 16: |
* [[http://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html|BitUnmap]]: vulnerability in Android ashmem | * [[https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html|BitUnmap]]: vulnerability in Android ashmem * [[https://googleprojectzero.blogspot.com/2017/02/lifting-hyper-visor-bypassing-samsungs.html|Bypassing Samsung’s Real-Time Kernel Protection]] * [[http://seclists.org/oss-sec/2017/q1/471|DCCP vuln]]: ancient Linux DCCP local root exploit |
This is a list of exploits or tools that can help you jail break your device so you can install Debian:
backdoor for Allwinner-based devices running the vendor's Linux 3.4 kernel
SamsungCID: Samsung eMMC exploit allowing bootloader unlock
routersploit: Router Exploitation Framework
WarOfTheWorlds: shellcode to hack Linux from a vulnerable TrustZone QSEE
Microsoft Secure Boot debug-mode: allows breaking Secure Boot on Windows RT devices
Quadrooter: four local-root vulnerabilities in Qualcomm-based Android devices
dirtyc0w: root exploit for Linux bug that was open for 10 years (Android rooting tool)
Drammer: tool for exploiting Android phones via Rowhammer issues in RAM modules
optus-sagemcom-fast-3864-hacks: enable telnet and run arbitrary code on the Optus Sagemcom F@ST 3864 broadband modem
BitUnmap: vulnerability in Android ashmem
DCCP vuln: ancient Linux DCCP local root exploit