## Learning Resources [MTK CLIENT IN DEPTH VIDEO](https://youtu.be/NulWJo2RSKE) [MTK Preloader](https://o0xmuhe.github.io/2022/03/05/MTK-Preloader-踩坑/) [MOSEC-2022](https://o0xmuhe.github.io/2022/11/23/议题解读-MOSEC2022-MediAttack-break-the-boot-chain-of-MediaTek-SoC/) [Dissecting MTK BROM Exploit](https://tinyhack.com/2021/01/31/dissecting-a-mediatek-bootrom-exploit/) [Dumping Exynos BROM](https://fredericb.info/2020/06/exynos8890-bootrom-dump-dump-exynos-8890-bootrom-from-samsung-galaxy-s7.html) [Rev Exynos BROM USB STACK ](https://fredericb.info/2020/06/reverse-engineer-usb-stack-of-exynos-bootrom.html#reverse-engineer-usb-stack-of-exynos-bootrom) [Buffer Overflow In Huawei BROM USB STACK](https://labs.taszk.io/blog/post/bootrom_usb/) [Exploiting CVE-2021-22429](https://x.com/_localo_/status/1650574561807572994) [Rabbit R1 Boot Notes](https://github.com/DavidBuchanan314/rabbit_r1_boot_notes/blob/main/README.md)