mirror of
https://github.com/bkerler/mtkclient.git
synced 2024-11-14 19:25:05 -05:00
added learning resources
This commit is contained in:
parent
31819b814d
commit
e7e640088e
1 changed files with 13 additions and 0 deletions
13
README.md
13
README.md
|
@ -497,3 +497,16 @@ For dxcc, you need to use plstage instead of stage
|
|||
### Chip details / configs
|
||||
- Go to config/brom_config.py
|
||||
- Unknown usb vid/pids for autodetection go to config/usb_ids.py
|
||||
|
||||
## Learning Resources
|
||||
[MTK Preloader](https://o0xmuhe.github.io/2022/03/05/MTK-Preloader-踩坑/)
|
||||
|
||||
[MOSEC-2022](https://o0xmuhe.github.io/2022/11/23/议题解读-MOSEC2022-MediAttack-break-the-boot-chain-of-MediaTek-SoC/)
|
||||
|
||||
[Dissecting MTK BROM Exploit](https://tinyhack.com/2021/01/31/dissecting-a-mediatek-bootrom-exploit/)
|
||||
|
||||
[Dumping Exynos BROM](https://fredericb.info/2020/06/exynos8890-bootrom-dump-dump-exynos-8890-bootrom-from-samsung-galaxy-s7.html)
|
||||
|
||||
[Rev Exynos BROM USB STACK ](https://fredericb.info/2020/06/reverse-engineer-usb-stack-of-exynos-bootrom.html#reverse-engineer-usb-stack-of-exynos-bootrom)
|
||||
|
||||
[Buffer Overflow In Huawei BROM USB STACK](https://labs.taszk.io/blog/post/bootrom_usb/)
|
||||
|
|
Loading…
Reference in a new issue