2841
Comment: lol
|
3375
sighax
|
Deletions are marked like this. | Additions are marked like this. |
Line 20: | Line 20: |
* [[http://www.sighax.com/|sighax]]: BootROM exploit for the Nintendo 3DS/2DS/New3DS | |
Line 23: | Line 24: |
* [[https://www.samba.org/samba/security/CVE-2017-7494.html|Samba remote code execution]]: useful for NAS/router systems running samba, use [[https://github.com/hdm/metasploit-framework/blob/0520d7cf76f8e5e654cb60f157772200c1b9e230/modules/exploits/linux/samba/is_known_pipename.rb|metasploit]] to get in * [[https://alephsecurity.com/2017/05/23/nexus6-initroot/|initroot]]: Bypassing Nexus 6 Secure Boot through Kernel Command-line Injection |
This is a list of exploits or tools that can help you jail break your device so you can install Debian:
backdoor for Allwinner-based devices running the vendor's Linux 3.4 kernel
SamsungCID: Samsung eMMC exploit allowing bootloader unlock
routersploit: Router Exploitation Framework
WarOfTheWorlds: shellcode to hack Linux from a vulnerable TrustZone QSEE
Microsoft Secure Boot debug-mode: allows breaking Secure Boot on Windows RT devices
Quadrooter: four local-root vulnerabilities in Qualcomm-based Android devices
dirtyc0w: root exploit for Linux bug that was open for 10 years (Android rooting tool)
Drammer: tool for exploiting Android phones via Rowhammer issues in RAM modules
optus-sagemcom-fast-3864-hacks: enable telnet and run arbitrary code on the Optus Sagemcom F@ST 3864 broadband modem
BitUnmap: vulnerability in Android ashmem
DCCP vuln: ancient Linux DCCP local root exploit
PegaSwitch: exploit toolkit for the Nintendo Switch
sighax: BootROM exploit for the Nintendo 3DS/2DS/New3DS
Samba remote code execution: useful for NAS/router systems running samba, use metasploit to get in
initroot: Bypassing Nexus 6 Secure Boot through Kernel Command-line Injection