Misc. Reverse Engineering Projects
gtasa.py - GTA:SA Trainer (Framework) for Linux
hp_bas.py - Cracking HP UEFI admin password
hp_hdd.py - Decode HP UEFI Automatic DriveLock password (xor rol xor)
a86_unlock.txt - Asus "The new PadFone Infinity" A86 (T004) Unlock Instructions and Recovering from "QHSUSB__BULK (9008)"
leontp_fw.py - Flash LeoNTP firmware
philips_atv_mem.py - Root Philips Android TV by (mis)using a backdoor
HP Probook 470 G1 UEFI L74 Ver. 01.47 from 2018-07-30 (latest, as of 2019-05-11):
HP's Automatic DriveLock is vulnerable to a hotplug attack. The DriveLock password gets sent to the harddisk before an user enters his password.
HP's Automatic DriveLock password is stored in the NVRAM variable "HP_AUTODL" (offset 0x14, len 0x20) and encoded with a weak "cipher". (xor 0x5a, rol 4, xor 0x66)
HP's UEFI admin password is converted to scancodes, hashed with SHA1 and stored in the NVRAM variable "HP_BIOSAdminScanCode"
Flipper Zero workaround for some undetectable iButtons: 4.4k pull-up resistor between 3.3V and 1W (pins 9 and 17). YMMV.
-
Notifications
You must be signed in to change notification settings - Fork 0
chris-pcguy/reveng-misc
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Misc. Reverse Engineering Projects
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published